Bug 1211607 (CVE-2023-31124)

Summary: VUL-0: CVE-2023-31124: c-ares: AutoTools does not set CARES_RANDOM_FILE during cross compilation
Product: [Novell Products] SUSE Security Incidents Reporter: Alexander Bergmann <abergmann>
Component: IncidentsAssignee: Security Team bot <security-team>
Status: NEW --- QA Contact: Security Team bot <security-team>
Severity: Normal    
Priority: P3 - Medium    
Version: unspecified   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/367131/
Whiteboard: CVSSv3.1:SUSE:CVE-2023-31124:3.7:(AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)
Found By: --- Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Description Alexander Bergmann 2023-05-22 13:50:52 UTC
https://github.com/c-ares/c-ares/security/advisories/GHSA-54xr-f67r-4pc4

CVE-2023-31124

Impact

When cross-compiling c-ares and using the autotools build system, CARES_RANDOM_FILE will not be set, as seen when cross compiling aarch64 android. This will downgrade to using rand() as a fallback which could allow an attacker to take advantage of the lack of entropy by not using a CSPRNG.
Patches

Patched in 1.19.1
Workarounds

Use CMake build system
Credit

David Gstir and Hannes Moesl
Comment 2 OBSbugzilla Bot 2023-05-22 16:35:10 UTC
This is an autogenerated message for OBS integration:
This bug (1211607) was mentioned in
https://build.opensuse.org/request/show/1088407 Factory / c-ares
Comment 7 Maintenance Automation 2023-05-30 08:30:01 UTC
SUSE-SU-2023:2313-1: An update that solves four vulnerabilities can now be installed.

Category: security (important)
Bug References: 1211604, 1211605, 1211606, 1211607
CVE References: CVE-2023-31124, CVE-2023-31130, CVE-2023-31147, CVE-2023-32067
Sources used:
openSUSE Leap Micro 5.3 (src): c-ares-1.19.1-150000.3.23.1
openSUSE Leap 15.4 (src): c-ares-1.19.1-150000.3.23.1
openSUSE Leap 15.5 (src): c-ares-1.19.1-150000.3.23.1
SUSE Linux Enterprise Micro for Rancher 5.3 (src): c-ares-1.19.1-150000.3.23.1
SUSE Linux Enterprise Micro 5.3 (src): c-ares-1.19.1-150000.3.23.1
SUSE Linux Enterprise Micro for Rancher 5.4 (src): c-ares-1.19.1-150000.3.23.1
SUSE Linux Enterprise Micro 5.4 (src): c-ares-1.19.1-150000.3.23.1
Basesystem Module 15-SP4 (src): c-ares-1.19.1-150000.3.23.1
Basesystem Module 15-SP5 (src): c-ares-1.19.1-150000.3.23.1
SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (src): c-ares-1.19.1-150000.3.23.1
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): c-ares-1.19.1-150000.3.23.1
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): c-ares-1.19.1-150000.3.23.1
SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): c-ares-1.19.1-150000.3.23.1
SUSE Linux Enterprise Real Time 15 SP3 (src): c-ares-1.19.1-150000.3.23.1
SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (src): c-ares-1.19.1-150000.3.23.1
SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): c-ares-1.19.1-150000.3.23.1
SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): c-ares-1.19.1-150000.3.23.1
SUSE Linux Enterprise Server for SAP Applications 15 SP1 (src): c-ares-1.19.1-150000.3.23.1
SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): c-ares-1.19.1-150000.3.23.1
SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): c-ares-1.19.1-150000.3.23.1
SUSE Manager Proxy 4.2 (src): c-ares-1.19.1-150000.3.23.1
SUSE Manager Retail Branch Server 4.2 (src): c-ares-1.19.1-150000.3.23.1
SUSE Manager Server 4.2 (src): c-ares-1.19.1-150000.3.23.1
SUSE Enterprise Storage 7.1 (src): c-ares-1.19.1-150000.3.23.1
SUSE Enterprise Storage 7 (src): c-ares-1.19.1-150000.3.23.1
SUSE CaaS Platform 4.0 (src): c-ares-1.19.1-150000.3.23.1
SUSE Linux Enterprise Micro 5.1 (src): c-ares-1.19.1-150000.3.23.1
SUSE Linux Enterprise Micro 5.2 (src): c-ares-1.19.1-150000.3.23.1
SUSE Linux Enterprise Micro for Rancher 5.2 (src): c-ares-1.19.1-150000.3.23.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 8 Maintenance Automation 2023-06-09 12:30:07 UTC
SUSE-SU-2023:2477-1: An update that solves four vulnerabilities can now be installed.

Category: security (important)
Bug References: 1211604, 1211605, 1211606, 1211607
CVE References: CVE-2023-31124, CVE-2023-31130, CVE-2023-31147, CVE-2023-32067
Sources used:
SUSE OpenStack Cloud 9 (src): libcares2-1.9.1-9.12.1
SUSE OpenStack Cloud Crowbar 9 (src): libcares2-1.9.1-9.12.1
SUSE Linux Enterprise Server for SAP Applications 12 SP4 (src): libcares2-1.9.1-9.12.1
SUSE Linux Enterprise Software Development Kit 12 SP5 (src): libcares2-1.9.1-9.12.1
SUSE Linux Enterprise Server 12 SP2 BCL 12-SP2 (src): libcares2-1.9.1-9.12.1
SUSE Linux Enterprise Server 12 SP4 ESPOS 12-SP4 (src): libcares2-1.9.1-9.12.1
SUSE Linux Enterprise Server 12 SP4 LTSS 12-SP4 (src): libcares2-1.9.1-9.12.1
SUSE Linux Enterprise High Performance Computing 12 SP5 (src): libcares2-1.9.1-9.12.1
SUSE Linux Enterprise Server 12 SP5 (src): libcares2-1.9.1-9.12.1
SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): libcares2-1.9.1-9.12.1
SUSE Linux Enterprise Workstation Extension 12 12-SP5 (src): libcares2-1.9.1-9.12.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 10 Maintenance Automation 2023-06-27 12:30:47 UTC
SUSE-SU-2023:2655-1: An update that solves nine vulnerabilities and has one fix can now be installed.

Category: security (important)
Bug References: 1211407, 1211604, 1211605, 1211606, 1211607, 1212574, 1212579, 1212581, 1212582, 1212583
CVE References: CVE-2023-30581, CVE-2023-30585, CVE-2023-30588, CVE-2023-30589, CVE-2023-30590, CVE-2023-31124, CVE-2023-31130, CVE-2023-31147, CVE-2023-32067
Sources used:
Web and Scripting Module 12 (src): nodejs16-16.20.1-8.30.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 11 Maintenance Automation 2023-06-27 20:30:17 UTC
SUSE-SU-2023:2663-1: An update that solves nine vulnerabilities and has one fix can now be installed.

Category: security (important)
Bug References: 1211407, 1211604, 1211605, 1211606, 1211607, 1212574, 1212579, 1212581, 1212582, 1212583
CVE References: CVE-2023-30581, CVE-2023-30585, CVE-2023-30588, CVE-2023-30589, CVE-2023-30590, CVE-2023-31124, CVE-2023-31130, CVE-2023-31147, CVE-2023-32067
Sources used:
openSUSE Leap 15.4 (src): nodejs16-16.20.1-150400.3.21.1
Web and Scripting Module 15-SP4 (src): nodejs16-16.20.1-150400.3.21.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 12 Maintenance Automation 2023-06-27 20:30:21 UTC
SUSE-SU-2023:2662-1: An update that solves 10 vulnerabilities and has one fix can now be installed.

Category: security (important)
Bug References: 1208744, 1211407, 1211604, 1211605, 1211606, 1211607, 1212574, 1212579, 1212581, 1212582, 1212583
CVE References: CVE-2022-25881, CVE-2023-30581, CVE-2023-30585, CVE-2023-30588, CVE-2023-30589, CVE-2023-30590, CVE-2023-31124, CVE-2023-31130, CVE-2023-31147, CVE-2023-32067
Sources used:
Web and Scripting Module 12 (src): nodejs18-18.16.1-8.9.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 13 Maintenance Automation 2023-06-28 11:42:48 UTC
SUSE-SU-2023:2669-1: An update that solves 10 vulnerabilities and has one fix can now be installed.

Category: security (important)
Bug References: 1208744, 1211407, 1211604, 1211605, 1211606, 1211607, 1212574, 1212579, 1212581, 1212582, 1212583
CVE References: CVE-2022-25881, CVE-2023-30581, CVE-2023-30585, CVE-2023-30588, CVE-2023-30589, CVE-2023-30590, CVE-2023-31124, CVE-2023-31130, CVE-2023-31147, CVE-2023-32067
Sources used:
openSUSE Leap 15.4 (src): nodejs18-18.16.1-150400.9.9.1
openSUSE Leap 15.5 (src): nodejs18-18.16.1-150400.9.9.1
Web and Scripting Module 15-SP4 (src): nodejs18-18.16.1-150400.9.9.1
Web and Scripting Module 15-SP5 (src): nodejs18-18.16.1-150400.9.9.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 14 Maintenance Automation 2023-07-17 16:37:44 UTC
SUSE-SU-2023:2861-1: An update that solves nine vulnerabilities and has one fix can now be installed.

Category: security (important)
Bug References: 1211407, 1211604, 1211605, 1211606, 1211607, 1212574, 1212579, 1212581, 1212582, 1212583
CVE References: CVE-2023-30581, CVE-2023-30585, CVE-2023-30588, CVE-2023-30589, CVE-2023-30590, CVE-2023-31124, CVE-2023-31130, CVE-2023-31147, CVE-2023-32067
Sources used:
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): nodejs16-16.20.1-150300.7.24.2
SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): nodejs16-16.20.1-150300.7.24.2
SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): nodejs16-16.20.1-150300.7.24.2
SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): nodejs16-16.20.1-150300.7.24.2
SUSE Manager Server 4.2 (src): nodejs16-16.20.1-150300.7.24.2
SUSE Enterprise Storage 7.1 (src): nodejs16-16.20.1-150300.7.24.2

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.