Bug 1211606 (CVE-2023-31130) - VUL-0: CVE-2023-31130: c-ares: Buffer Underwrite in ares_inet_net_pton()
Summary: VUL-0: CVE-2023-31130: c-ares: Buffer Underwrite in ares_inet_net_pton()
Status: NEW
Alias: CVE-2023-31130
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/367129/
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2023-05-22 13:50 UTC by Alexander Bergmann
Modified: 2023-08-10 14:50 UTC (History)
0 users

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Alexander Bergmann 2023-05-22 13:50:49 UTC
https://github.com/c-ares/c-ares/security/advisories/GHSA-x6mf-cxr9-8q6v

CVE-2023-31130

Impact

ares_inet_net_pton() is vulnerable to a buffer underflow for certain ipv6 addresses, in particular "0::00:00:00/2" was found to cause an issue. C-ares only uses this function internally for configuration purposes which would require an administrator to configure such an address via ares_set_sortlist().

However, users may externally use ares_inet_net_pton() for other purposes and thus be vulnerable to more severe issues.
Patches

Fixed in 1.19.1
Workarounds

No workarounds are available.
Credit

Hannes Moesl
Comment 2 OBSbugzilla Bot 2023-05-22 16:35:08 UTC
This is an autogenerated message for OBS integration:
This bug (1211606) was mentioned in
https://build.opensuse.org/request/show/1088407 Factory / c-ares
Comment 7 Maintenance Automation 2023-05-30 08:30:01 UTC
SUSE-SU-2023:2313-1: An update that solves four vulnerabilities can now be installed.

Category: security (important)
Bug References: 1211604, 1211605, 1211606, 1211607
CVE References: CVE-2023-31124, CVE-2023-31130, CVE-2023-31147, CVE-2023-32067
Sources used:
openSUSE Leap Micro 5.3 (src): c-ares-1.19.1-150000.3.23.1
openSUSE Leap 15.4 (src): c-ares-1.19.1-150000.3.23.1
openSUSE Leap 15.5 (src): c-ares-1.19.1-150000.3.23.1
SUSE Linux Enterprise Micro for Rancher 5.3 (src): c-ares-1.19.1-150000.3.23.1
SUSE Linux Enterprise Micro 5.3 (src): c-ares-1.19.1-150000.3.23.1
SUSE Linux Enterprise Micro for Rancher 5.4 (src): c-ares-1.19.1-150000.3.23.1
SUSE Linux Enterprise Micro 5.4 (src): c-ares-1.19.1-150000.3.23.1
Basesystem Module 15-SP4 (src): c-ares-1.19.1-150000.3.23.1
Basesystem Module 15-SP5 (src): c-ares-1.19.1-150000.3.23.1
SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (src): c-ares-1.19.1-150000.3.23.1
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): c-ares-1.19.1-150000.3.23.1
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): c-ares-1.19.1-150000.3.23.1
SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): c-ares-1.19.1-150000.3.23.1
SUSE Linux Enterprise Real Time 15 SP3 (src): c-ares-1.19.1-150000.3.23.1
SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (src): c-ares-1.19.1-150000.3.23.1
SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): c-ares-1.19.1-150000.3.23.1
SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): c-ares-1.19.1-150000.3.23.1
SUSE Linux Enterprise Server for SAP Applications 15 SP1 (src): c-ares-1.19.1-150000.3.23.1
SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): c-ares-1.19.1-150000.3.23.1
SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): c-ares-1.19.1-150000.3.23.1
SUSE Manager Proxy 4.2 (src): c-ares-1.19.1-150000.3.23.1
SUSE Manager Retail Branch Server 4.2 (src): c-ares-1.19.1-150000.3.23.1
SUSE Manager Server 4.2 (src): c-ares-1.19.1-150000.3.23.1
SUSE Enterprise Storage 7.1 (src): c-ares-1.19.1-150000.3.23.1
SUSE Enterprise Storage 7 (src): c-ares-1.19.1-150000.3.23.1
SUSE CaaS Platform 4.0 (src): c-ares-1.19.1-150000.3.23.1
SUSE Linux Enterprise Micro 5.1 (src): c-ares-1.19.1-150000.3.23.1
SUSE Linux Enterprise Micro 5.2 (src): c-ares-1.19.1-150000.3.23.1
SUSE Linux Enterprise Micro for Rancher 5.2 (src): c-ares-1.19.1-150000.3.23.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 8 Maintenance Automation 2023-06-09 12:30:07 UTC
SUSE-SU-2023:2477-1: An update that solves four vulnerabilities can now be installed.

Category: security (important)
Bug References: 1211604, 1211605, 1211606, 1211607
CVE References: CVE-2023-31124, CVE-2023-31130, CVE-2023-31147, CVE-2023-32067
Sources used:
SUSE OpenStack Cloud 9 (src): libcares2-1.9.1-9.12.1
SUSE OpenStack Cloud Crowbar 9 (src): libcares2-1.9.1-9.12.1
SUSE Linux Enterprise Server for SAP Applications 12 SP4 (src): libcares2-1.9.1-9.12.1
SUSE Linux Enterprise Software Development Kit 12 SP5 (src): libcares2-1.9.1-9.12.1
SUSE Linux Enterprise Server 12 SP2 BCL 12-SP2 (src): libcares2-1.9.1-9.12.1
SUSE Linux Enterprise Server 12 SP4 ESPOS 12-SP4 (src): libcares2-1.9.1-9.12.1
SUSE Linux Enterprise Server 12 SP4 LTSS 12-SP4 (src): libcares2-1.9.1-9.12.1
SUSE Linux Enterprise High Performance Computing 12 SP5 (src): libcares2-1.9.1-9.12.1
SUSE Linux Enterprise Server 12 SP5 (src): libcares2-1.9.1-9.12.1
SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): libcares2-1.9.1-9.12.1
SUSE Linux Enterprise Workstation Extension 12 12-SP5 (src): libcares2-1.9.1-9.12.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 10 Maintenance Automation 2023-06-27 12:30:47 UTC
SUSE-SU-2023:2655-1: An update that solves nine vulnerabilities and has one fix can now be installed.

Category: security (important)
Bug References: 1211407, 1211604, 1211605, 1211606, 1211607, 1212574, 1212579, 1212581, 1212582, 1212583
CVE References: CVE-2023-30581, CVE-2023-30585, CVE-2023-30588, CVE-2023-30589, CVE-2023-30590, CVE-2023-31124, CVE-2023-31130, CVE-2023-31147, CVE-2023-32067
Sources used:
Web and Scripting Module 12 (src): nodejs16-16.20.1-8.30.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 11 Maintenance Automation 2023-06-27 20:30:17 UTC
SUSE-SU-2023:2663-1: An update that solves nine vulnerabilities and has one fix can now be installed.

Category: security (important)
Bug References: 1211407, 1211604, 1211605, 1211606, 1211607, 1212574, 1212579, 1212581, 1212582, 1212583
CVE References: CVE-2023-30581, CVE-2023-30585, CVE-2023-30588, CVE-2023-30589, CVE-2023-30590, CVE-2023-31124, CVE-2023-31130, CVE-2023-31147, CVE-2023-32067
Sources used:
openSUSE Leap 15.4 (src): nodejs16-16.20.1-150400.3.21.1
Web and Scripting Module 15-SP4 (src): nodejs16-16.20.1-150400.3.21.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 12 Maintenance Automation 2023-06-27 20:30:21 UTC
SUSE-SU-2023:2662-1: An update that solves 10 vulnerabilities and has one fix can now be installed.

Category: security (important)
Bug References: 1208744, 1211407, 1211604, 1211605, 1211606, 1211607, 1212574, 1212579, 1212581, 1212582, 1212583
CVE References: CVE-2022-25881, CVE-2023-30581, CVE-2023-30585, CVE-2023-30588, CVE-2023-30589, CVE-2023-30590, CVE-2023-31124, CVE-2023-31130, CVE-2023-31147, CVE-2023-32067
Sources used:
Web and Scripting Module 12 (src): nodejs18-18.16.1-8.9.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 13 Maintenance Automation 2023-06-28 11:42:48 UTC
SUSE-SU-2023:2669-1: An update that solves 10 vulnerabilities and has one fix can now be installed.

Category: security (important)
Bug References: 1208744, 1211407, 1211604, 1211605, 1211606, 1211607, 1212574, 1212579, 1212581, 1212582, 1212583
CVE References: CVE-2022-25881, CVE-2023-30581, CVE-2023-30585, CVE-2023-30588, CVE-2023-30589, CVE-2023-30590, CVE-2023-31124, CVE-2023-31130, CVE-2023-31147, CVE-2023-32067
Sources used:
openSUSE Leap 15.4 (src): nodejs18-18.16.1-150400.9.9.1
openSUSE Leap 15.5 (src): nodejs18-18.16.1-150400.9.9.1
Web and Scripting Module 15-SP4 (src): nodejs18-18.16.1-150400.9.9.1
Web and Scripting Module 15-SP5 (src): nodejs18-18.16.1-150400.9.9.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 14 Maintenance Automation 2023-07-17 16:37:44 UTC
SUSE-SU-2023:2861-1: An update that solves nine vulnerabilities and has one fix can now be installed.

Category: security (important)
Bug References: 1211407, 1211604, 1211605, 1211606, 1211607, 1212574, 1212579, 1212581, 1212582, 1212583
CVE References: CVE-2023-30581, CVE-2023-30585, CVE-2023-30588, CVE-2023-30589, CVE-2023-30590, CVE-2023-31124, CVE-2023-31130, CVE-2023-31147, CVE-2023-32067
Sources used:
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): nodejs16-16.20.1-150300.7.24.2
SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): nodejs16-16.20.1-150300.7.24.2
SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): nodejs16-16.20.1-150300.7.24.2
SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): nodejs16-16.20.1-150300.7.24.2
SUSE Manager Server 4.2 (src): nodejs16-16.20.1-150300.7.24.2
SUSE Enterprise Storage 7.1 (src): nodejs16-16.20.1-150300.7.24.2

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.