Bugzilla – Bug 1211605
VUL-0: CVE-2023-31147: c-ares: Insufficient randomness in generation of DNS query IDs
Last modified: 2023-08-10 14:50:12 UTC
https://github.com/c-ares/c-ares/security/advisories/GHSA-8r8p-23f3-64c2 CVE-2023-31147 Impact Description of issue(s): When /dev/urandom or RtlGenRandom() are unavailable, c-ares uses rand() to generate random numbers used for DNS query ids. This is not a CSPRNG, and it is also not seeded by srand() so will generate predictable output. Input from the random number generator is fed into a non-compilant RC4 implementation and may not be as strong as the original RC4 implementation. No attempt is made to look for modern OS-provided CSPRNGs like arc4random() that is widely available. Correction(s) made: Detect arc4random() and if available, use it directly to generate DNS query ids. Use /dev/urandom or RtlGenRandom() directly to generate DNS query ids as a fallback As a last resort, use the current rand() + RC4 logic (should only apply to esoteric systems), with these modifications: replace RC4 implementation with official algorithm seed rand() using srand() Patches Fixed in 1.19.1 Workarounds No workarounds are available. Credit David Gstir and Hannes Moesl
This is an autogenerated message for OBS integration: This bug (1211605) was mentioned in https://build.opensuse.org/request/show/1088407 Factory / c-ares
SUSE-SU-2023:2313-1: An update that solves four vulnerabilities can now be installed. Category: security (important) Bug References: 1211604, 1211605, 1211606, 1211607 CVE References: CVE-2023-31124, CVE-2023-31130, CVE-2023-31147, CVE-2023-32067 Sources used: openSUSE Leap Micro 5.3 (src): c-ares-1.19.1-150000.3.23.1 openSUSE Leap 15.4 (src): c-ares-1.19.1-150000.3.23.1 openSUSE Leap 15.5 (src): c-ares-1.19.1-150000.3.23.1 SUSE Linux Enterprise Micro for Rancher 5.3 (src): c-ares-1.19.1-150000.3.23.1 SUSE Linux Enterprise Micro 5.3 (src): c-ares-1.19.1-150000.3.23.1 SUSE Linux Enterprise Micro for Rancher 5.4 (src): c-ares-1.19.1-150000.3.23.1 SUSE Linux Enterprise Micro 5.4 (src): c-ares-1.19.1-150000.3.23.1 Basesystem Module 15-SP4 (src): c-ares-1.19.1-150000.3.23.1 Basesystem Module 15-SP5 (src): c-ares-1.19.1-150000.3.23.1 SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (src): c-ares-1.19.1-150000.3.23.1 SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): c-ares-1.19.1-150000.3.23.1 SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): c-ares-1.19.1-150000.3.23.1 SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): c-ares-1.19.1-150000.3.23.1 SUSE Linux Enterprise Real Time 15 SP3 (src): c-ares-1.19.1-150000.3.23.1 SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (src): c-ares-1.19.1-150000.3.23.1 SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): c-ares-1.19.1-150000.3.23.1 SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): c-ares-1.19.1-150000.3.23.1 SUSE Linux Enterprise Server for SAP Applications 15 SP1 (src): c-ares-1.19.1-150000.3.23.1 SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): c-ares-1.19.1-150000.3.23.1 SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): c-ares-1.19.1-150000.3.23.1 SUSE Manager Proxy 4.2 (src): c-ares-1.19.1-150000.3.23.1 SUSE Manager Retail Branch Server 4.2 (src): c-ares-1.19.1-150000.3.23.1 SUSE Manager Server 4.2 (src): c-ares-1.19.1-150000.3.23.1 SUSE Enterprise Storage 7.1 (src): c-ares-1.19.1-150000.3.23.1 SUSE Enterprise Storage 7 (src): c-ares-1.19.1-150000.3.23.1 SUSE CaaS Platform 4.0 (src): c-ares-1.19.1-150000.3.23.1 SUSE Linux Enterprise Micro 5.1 (src): c-ares-1.19.1-150000.3.23.1 SUSE Linux Enterprise Micro 5.2 (src): c-ares-1.19.1-150000.3.23.1 SUSE Linux Enterprise Micro for Rancher 5.2 (src): c-ares-1.19.1-150000.3.23.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:2477-1: An update that solves four vulnerabilities can now be installed. Category: security (important) Bug References: 1211604, 1211605, 1211606, 1211607 CVE References: CVE-2023-31124, CVE-2023-31130, CVE-2023-31147, CVE-2023-32067 Sources used: SUSE OpenStack Cloud 9 (src): libcares2-1.9.1-9.12.1 SUSE OpenStack Cloud Crowbar 9 (src): libcares2-1.9.1-9.12.1 SUSE Linux Enterprise Server for SAP Applications 12 SP4 (src): libcares2-1.9.1-9.12.1 SUSE Linux Enterprise Software Development Kit 12 SP5 (src): libcares2-1.9.1-9.12.1 SUSE Linux Enterprise Server 12 SP2 BCL 12-SP2 (src): libcares2-1.9.1-9.12.1 SUSE Linux Enterprise Server 12 SP4 ESPOS 12-SP4 (src): libcares2-1.9.1-9.12.1 SUSE Linux Enterprise Server 12 SP4 LTSS 12-SP4 (src): libcares2-1.9.1-9.12.1 SUSE Linux Enterprise High Performance Computing 12 SP5 (src): libcares2-1.9.1-9.12.1 SUSE Linux Enterprise Server 12 SP5 (src): libcares2-1.9.1-9.12.1 SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): libcares2-1.9.1-9.12.1 SUSE Linux Enterprise Workstation Extension 12 12-SP5 (src): libcares2-1.9.1-9.12.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:2655-1: An update that solves nine vulnerabilities and has one fix can now be installed. Category: security (important) Bug References: 1211407, 1211604, 1211605, 1211606, 1211607, 1212574, 1212579, 1212581, 1212582, 1212583 CVE References: CVE-2023-30581, CVE-2023-30585, CVE-2023-30588, CVE-2023-30589, CVE-2023-30590, CVE-2023-31124, CVE-2023-31130, CVE-2023-31147, CVE-2023-32067 Sources used: Web and Scripting Module 12 (src): nodejs16-16.20.1-8.30.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:2663-1: An update that solves nine vulnerabilities and has one fix can now be installed. Category: security (important) Bug References: 1211407, 1211604, 1211605, 1211606, 1211607, 1212574, 1212579, 1212581, 1212582, 1212583 CVE References: CVE-2023-30581, CVE-2023-30585, CVE-2023-30588, CVE-2023-30589, CVE-2023-30590, CVE-2023-31124, CVE-2023-31130, CVE-2023-31147, CVE-2023-32067 Sources used: openSUSE Leap 15.4 (src): nodejs16-16.20.1-150400.3.21.1 Web and Scripting Module 15-SP4 (src): nodejs16-16.20.1-150400.3.21.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:2662-1: An update that solves 10 vulnerabilities and has one fix can now be installed. Category: security (important) Bug References: 1208744, 1211407, 1211604, 1211605, 1211606, 1211607, 1212574, 1212579, 1212581, 1212582, 1212583 CVE References: CVE-2022-25881, CVE-2023-30581, CVE-2023-30585, CVE-2023-30588, CVE-2023-30589, CVE-2023-30590, CVE-2023-31124, CVE-2023-31130, CVE-2023-31147, CVE-2023-32067 Sources used: Web and Scripting Module 12 (src): nodejs18-18.16.1-8.9.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:2669-1: An update that solves 10 vulnerabilities and has one fix can now be installed. Category: security (important) Bug References: 1208744, 1211407, 1211604, 1211605, 1211606, 1211607, 1212574, 1212579, 1212581, 1212582, 1212583 CVE References: CVE-2022-25881, CVE-2023-30581, CVE-2023-30585, CVE-2023-30588, CVE-2023-30589, CVE-2023-30590, CVE-2023-31124, CVE-2023-31130, CVE-2023-31147, CVE-2023-32067 Sources used: openSUSE Leap 15.4 (src): nodejs18-18.16.1-150400.9.9.1 openSUSE Leap 15.5 (src): nodejs18-18.16.1-150400.9.9.1 Web and Scripting Module 15-SP4 (src): nodejs18-18.16.1-150400.9.9.1 Web and Scripting Module 15-SP5 (src): nodejs18-18.16.1-150400.9.9.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:2861-1: An update that solves nine vulnerabilities and has one fix can now be installed. Category: security (important) Bug References: 1211407, 1211604, 1211605, 1211606, 1211607, 1212574, 1212579, 1212581, 1212582, 1212583 CVE References: CVE-2023-30581, CVE-2023-30585, CVE-2023-30588, CVE-2023-30589, CVE-2023-30590, CVE-2023-31124, CVE-2023-31130, CVE-2023-31147, CVE-2023-32067 Sources used: SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): nodejs16-16.20.1-150300.7.24.2 SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): nodejs16-16.20.1-150300.7.24.2 SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): nodejs16-16.20.1-150300.7.24.2 SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): nodejs16-16.20.1-150300.7.24.2 SUSE Manager Server 4.2 (src): nodejs16-16.20.1-150300.7.24.2 SUSE Enterprise Storage 7.1 (src): nodejs16-16.20.1-150300.7.24.2 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.