Bug 1211604 (CVE-2023-32067) - VUL-0: CVE-2023-32067: c-ares: 0-byte UDP payload causes Denial of Service
Summary: VUL-0: CVE-2023-32067: c-ares: 0-byte UDP payload causes Denial of Service
Status: NEW
Alias: CVE-2023-32067
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Major
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/367125/
Whiteboard: CVSSv3.1:SUSE:CVE-2023-32067:7.5:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2023-05-22 13:50 UTC by Alexander Bergmann
Modified: 2023-08-10 14:50 UTC (History)
1 user (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Alexander Bergmann 2023-05-22 13:50:47 UTC
CVE-2023-32067

https://github.com/c-ares/c-ares/security/advisories/GHSA-9g78-jv2r-p7vc

Description:

Impact: Denial of Service.
Attack Steps:

    The target resolver sends a query
    The attacker forges a malformed UDP packet with a length of 0 and returns them to the target resolver
    The target resolver erroneously interprets the 0 length as a graceful shutdown of the connection. (this is only valid for TCP connections, UDP is connection-less)
    Current resolution fails, DoS attack is achieved.

Patches: Fixed in 1.19.1
Workarounds: No workarounds are available.
Credit: Xiang Li
Comment 2 OBSbugzilla Bot 2023-05-22 16:35:04 UTC
This is an autogenerated message for OBS integration:
This bug (1211604) was mentioned in
https://build.opensuse.org/request/show/1088407 Factory / c-ares
Comment 7 Maintenance Automation 2023-05-30 08:30:01 UTC
SUSE-SU-2023:2313-1: An update that solves four vulnerabilities can now be installed.

Category: security (important)
Bug References: 1211604, 1211605, 1211606, 1211607
CVE References: CVE-2023-31124, CVE-2023-31130, CVE-2023-31147, CVE-2023-32067
Sources used:
openSUSE Leap Micro 5.3 (src): c-ares-1.19.1-150000.3.23.1
openSUSE Leap 15.4 (src): c-ares-1.19.1-150000.3.23.1
openSUSE Leap 15.5 (src): c-ares-1.19.1-150000.3.23.1
SUSE Linux Enterprise Micro for Rancher 5.3 (src): c-ares-1.19.1-150000.3.23.1
SUSE Linux Enterprise Micro 5.3 (src): c-ares-1.19.1-150000.3.23.1
SUSE Linux Enterprise Micro for Rancher 5.4 (src): c-ares-1.19.1-150000.3.23.1
SUSE Linux Enterprise Micro 5.4 (src): c-ares-1.19.1-150000.3.23.1
Basesystem Module 15-SP4 (src): c-ares-1.19.1-150000.3.23.1
Basesystem Module 15-SP5 (src): c-ares-1.19.1-150000.3.23.1
SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (src): c-ares-1.19.1-150000.3.23.1
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): c-ares-1.19.1-150000.3.23.1
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): c-ares-1.19.1-150000.3.23.1
SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): c-ares-1.19.1-150000.3.23.1
SUSE Linux Enterprise Real Time 15 SP3 (src): c-ares-1.19.1-150000.3.23.1
SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (src): c-ares-1.19.1-150000.3.23.1
SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): c-ares-1.19.1-150000.3.23.1
SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): c-ares-1.19.1-150000.3.23.1
SUSE Linux Enterprise Server for SAP Applications 15 SP1 (src): c-ares-1.19.1-150000.3.23.1
SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): c-ares-1.19.1-150000.3.23.1
SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): c-ares-1.19.1-150000.3.23.1
SUSE Manager Proxy 4.2 (src): c-ares-1.19.1-150000.3.23.1
SUSE Manager Retail Branch Server 4.2 (src): c-ares-1.19.1-150000.3.23.1
SUSE Manager Server 4.2 (src): c-ares-1.19.1-150000.3.23.1
SUSE Enterprise Storage 7.1 (src): c-ares-1.19.1-150000.3.23.1
SUSE Enterprise Storage 7 (src): c-ares-1.19.1-150000.3.23.1
SUSE CaaS Platform 4.0 (src): c-ares-1.19.1-150000.3.23.1
SUSE Linux Enterprise Micro 5.1 (src): c-ares-1.19.1-150000.3.23.1
SUSE Linux Enterprise Micro 5.2 (src): c-ares-1.19.1-150000.3.23.1
SUSE Linux Enterprise Micro for Rancher 5.2 (src): c-ares-1.19.1-150000.3.23.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 8 Maintenance Automation 2023-06-09 12:30:06 UTC
SUSE-SU-2023:2477-1: An update that solves four vulnerabilities can now be installed.

Category: security (important)
Bug References: 1211604, 1211605, 1211606, 1211607
CVE References: CVE-2023-31124, CVE-2023-31130, CVE-2023-31147, CVE-2023-32067
Sources used:
SUSE OpenStack Cloud 9 (src): libcares2-1.9.1-9.12.1
SUSE OpenStack Cloud Crowbar 9 (src): libcares2-1.9.1-9.12.1
SUSE Linux Enterprise Server for SAP Applications 12 SP4 (src): libcares2-1.9.1-9.12.1
SUSE Linux Enterprise Software Development Kit 12 SP5 (src): libcares2-1.9.1-9.12.1
SUSE Linux Enterprise Server 12 SP2 BCL 12-SP2 (src): libcares2-1.9.1-9.12.1
SUSE Linux Enterprise Server 12 SP4 ESPOS 12-SP4 (src): libcares2-1.9.1-9.12.1
SUSE Linux Enterprise Server 12 SP4 LTSS 12-SP4 (src): libcares2-1.9.1-9.12.1
SUSE Linux Enterprise High Performance Computing 12 SP5 (src): libcares2-1.9.1-9.12.1
SUSE Linux Enterprise Server 12 SP5 (src): libcares2-1.9.1-9.12.1
SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): libcares2-1.9.1-9.12.1
SUSE Linux Enterprise Workstation Extension 12 12-SP5 (src): libcares2-1.9.1-9.12.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 10 Maintenance Automation 2023-06-27 12:30:47 UTC
SUSE-SU-2023:2655-1: An update that solves nine vulnerabilities and has one fix can now be installed.

Category: security (important)
Bug References: 1211407, 1211604, 1211605, 1211606, 1211607, 1212574, 1212579, 1212581, 1212582, 1212583
CVE References: CVE-2023-30581, CVE-2023-30585, CVE-2023-30588, CVE-2023-30589, CVE-2023-30590, CVE-2023-31124, CVE-2023-31130, CVE-2023-31147, CVE-2023-32067
Sources used:
Web and Scripting Module 12 (src): nodejs16-16.20.1-8.30.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 11 Maintenance Automation 2023-06-27 20:30:17 UTC
SUSE-SU-2023:2663-1: An update that solves nine vulnerabilities and has one fix can now be installed.

Category: security (important)
Bug References: 1211407, 1211604, 1211605, 1211606, 1211607, 1212574, 1212579, 1212581, 1212582, 1212583
CVE References: CVE-2023-30581, CVE-2023-30585, CVE-2023-30588, CVE-2023-30589, CVE-2023-30590, CVE-2023-31124, CVE-2023-31130, CVE-2023-31147, CVE-2023-32067
Sources used:
openSUSE Leap 15.4 (src): nodejs16-16.20.1-150400.3.21.1
Web and Scripting Module 15-SP4 (src): nodejs16-16.20.1-150400.3.21.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 12 Maintenance Automation 2023-06-27 20:30:21 UTC
SUSE-SU-2023:2662-1: An update that solves 10 vulnerabilities and has one fix can now be installed.

Category: security (important)
Bug References: 1208744, 1211407, 1211604, 1211605, 1211606, 1211607, 1212574, 1212579, 1212581, 1212582, 1212583
CVE References: CVE-2022-25881, CVE-2023-30581, CVE-2023-30585, CVE-2023-30588, CVE-2023-30589, CVE-2023-30590, CVE-2023-31124, CVE-2023-31130, CVE-2023-31147, CVE-2023-32067
Sources used:
Web and Scripting Module 12 (src): nodejs18-18.16.1-8.9.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 13 Maintenance Automation 2023-06-28 11:42:48 UTC
SUSE-SU-2023:2669-1: An update that solves 10 vulnerabilities and has one fix can now be installed.

Category: security (important)
Bug References: 1208744, 1211407, 1211604, 1211605, 1211606, 1211607, 1212574, 1212579, 1212581, 1212582, 1212583
CVE References: CVE-2022-25881, CVE-2023-30581, CVE-2023-30585, CVE-2023-30588, CVE-2023-30589, CVE-2023-30590, CVE-2023-31124, CVE-2023-31130, CVE-2023-31147, CVE-2023-32067
Sources used:
openSUSE Leap 15.4 (src): nodejs18-18.16.1-150400.9.9.1
openSUSE Leap 15.5 (src): nodejs18-18.16.1-150400.9.9.1
Web and Scripting Module 15-SP4 (src): nodejs18-18.16.1-150400.9.9.1
Web and Scripting Module 15-SP5 (src): nodejs18-18.16.1-150400.9.9.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 14 Maintenance Automation 2023-07-17 16:37:44 UTC
SUSE-SU-2023:2861-1: An update that solves nine vulnerabilities and has one fix can now be installed.

Category: security (important)
Bug References: 1211407, 1211604, 1211605, 1211606, 1211607, 1212574, 1212579, 1212581, 1212582, 1212583
CVE References: CVE-2023-30581, CVE-2023-30585, CVE-2023-30588, CVE-2023-30589, CVE-2023-30590, CVE-2023-31124, CVE-2023-31130, CVE-2023-31147, CVE-2023-32067
Sources used:
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): nodejs16-16.20.1-150300.7.24.2
SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): nodejs16-16.20.1-150300.7.24.2
SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): nodejs16-16.20.1-150300.7.24.2
SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): nodejs16-16.20.1-150300.7.24.2
SUSE Manager Server 4.2 (src): nodejs16-16.20.1-150300.7.24.2
SUSE Enterprise Storage 7.1 (src): nodejs16-16.20.1-150300.7.24.2

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.