Bugzilla – Bug 1211606
VUL-0: CVE-2023-31130: c-ares: Buffer Underwrite in ares_inet_net_pton()
Last modified: 2023-08-10 14:50:18 UTC
https://github.com/c-ares/c-ares/security/advisories/GHSA-x6mf-cxr9-8q6v CVE-2023-31130 Impact ares_inet_net_pton() is vulnerable to a buffer underflow for certain ipv6 addresses, in particular "0::00:00:00/2" was found to cause an issue. C-ares only uses this function internally for configuration purposes which would require an administrator to configure such an address via ares_set_sortlist(). However, users may externally use ares_inet_net_pton() for other purposes and thus be vulnerable to more severe issues. Patches Fixed in 1.19.1 Workarounds No workarounds are available. Credit Hannes Moesl
This is an autogenerated message for OBS integration: This bug (1211606) was mentioned in https://build.opensuse.org/request/show/1088407 Factory / c-ares
SUSE-SU-2023:2313-1: An update that solves four vulnerabilities can now be installed. Category: security (important) Bug References: 1211604, 1211605, 1211606, 1211607 CVE References: CVE-2023-31124, CVE-2023-31130, CVE-2023-31147, CVE-2023-32067 Sources used: openSUSE Leap Micro 5.3 (src): c-ares-1.19.1-150000.3.23.1 openSUSE Leap 15.4 (src): c-ares-1.19.1-150000.3.23.1 openSUSE Leap 15.5 (src): c-ares-1.19.1-150000.3.23.1 SUSE Linux Enterprise Micro for Rancher 5.3 (src): c-ares-1.19.1-150000.3.23.1 SUSE Linux Enterprise Micro 5.3 (src): c-ares-1.19.1-150000.3.23.1 SUSE Linux Enterprise Micro for Rancher 5.4 (src): c-ares-1.19.1-150000.3.23.1 SUSE Linux Enterprise Micro 5.4 (src): c-ares-1.19.1-150000.3.23.1 Basesystem Module 15-SP4 (src): c-ares-1.19.1-150000.3.23.1 Basesystem Module 15-SP5 (src): c-ares-1.19.1-150000.3.23.1 SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (src): c-ares-1.19.1-150000.3.23.1 SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): c-ares-1.19.1-150000.3.23.1 SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): c-ares-1.19.1-150000.3.23.1 SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): c-ares-1.19.1-150000.3.23.1 SUSE Linux Enterprise Real Time 15 SP3 (src): c-ares-1.19.1-150000.3.23.1 SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (src): c-ares-1.19.1-150000.3.23.1 SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): c-ares-1.19.1-150000.3.23.1 SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): c-ares-1.19.1-150000.3.23.1 SUSE Linux Enterprise Server for SAP Applications 15 SP1 (src): c-ares-1.19.1-150000.3.23.1 SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): c-ares-1.19.1-150000.3.23.1 SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): c-ares-1.19.1-150000.3.23.1 SUSE Manager Proxy 4.2 (src): c-ares-1.19.1-150000.3.23.1 SUSE Manager Retail Branch Server 4.2 (src): c-ares-1.19.1-150000.3.23.1 SUSE Manager Server 4.2 (src): c-ares-1.19.1-150000.3.23.1 SUSE Enterprise Storage 7.1 (src): c-ares-1.19.1-150000.3.23.1 SUSE Enterprise Storage 7 (src): c-ares-1.19.1-150000.3.23.1 SUSE CaaS Platform 4.0 (src): c-ares-1.19.1-150000.3.23.1 SUSE Linux Enterprise Micro 5.1 (src): c-ares-1.19.1-150000.3.23.1 SUSE Linux Enterprise Micro 5.2 (src): c-ares-1.19.1-150000.3.23.1 SUSE Linux Enterprise Micro for Rancher 5.2 (src): c-ares-1.19.1-150000.3.23.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:2477-1: An update that solves four vulnerabilities can now be installed. Category: security (important) Bug References: 1211604, 1211605, 1211606, 1211607 CVE References: CVE-2023-31124, CVE-2023-31130, CVE-2023-31147, CVE-2023-32067 Sources used: SUSE OpenStack Cloud 9 (src): libcares2-1.9.1-9.12.1 SUSE OpenStack Cloud Crowbar 9 (src): libcares2-1.9.1-9.12.1 SUSE Linux Enterprise Server for SAP Applications 12 SP4 (src): libcares2-1.9.1-9.12.1 SUSE Linux Enterprise Software Development Kit 12 SP5 (src): libcares2-1.9.1-9.12.1 SUSE Linux Enterprise Server 12 SP2 BCL 12-SP2 (src): libcares2-1.9.1-9.12.1 SUSE Linux Enterprise Server 12 SP4 ESPOS 12-SP4 (src): libcares2-1.9.1-9.12.1 SUSE Linux Enterprise Server 12 SP4 LTSS 12-SP4 (src): libcares2-1.9.1-9.12.1 SUSE Linux Enterprise High Performance Computing 12 SP5 (src): libcares2-1.9.1-9.12.1 SUSE Linux Enterprise Server 12 SP5 (src): libcares2-1.9.1-9.12.1 SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): libcares2-1.9.1-9.12.1 SUSE Linux Enterprise Workstation Extension 12 12-SP5 (src): libcares2-1.9.1-9.12.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:2655-1: An update that solves nine vulnerabilities and has one fix can now be installed. Category: security (important) Bug References: 1211407, 1211604, 1211605, 1211606, 1211607, 1212574, 1212579, 1212581, 1212582, 1212583 CVE References: CVE-2023-30581, CVE-2023-30585, CVE-2023-30588, CVE-2023-30589, CVE-2023-30590, CVE-2023-31124, CVE-2023-31130, CVE-2023-31147, CVE-2023-32067 Sources used: Web and Scripting Module 12 (src): nodejs16-16.20.1-8.30.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:2663-1: An update that solves nine vulnerabilities and has one fix can now be installed. Category: security (important) Bug References: 1211407, 1211604, 1211605, 1211606, 1211607, 1212574, 1212579, 1212581, 1212582, 1212583 CVE References: CVE-2023-30581, CVE-2023-30585, CVE-2023-30588, CVE-2023-30589, CVE-2023-30590, CVE-2023-31124, CVE-2023-31130, CVE-2023-31147, CVE-2023-32067 Sources used: openSUSE Leap 15.4 (src): nodejs16-16.20.1-150400.3.21.1 Web and Scripting Module 15-SP4 (src): nodejs16-16.20.1-150400.3.21.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:2662-1: An update that solves 10 vulnerabilities and has one fix can now be installed. Category: security (important) Bug References: 1208744, 1211407, 1211604, 1211605, 1211606, 1211607, 1212574, 1212579, 1212581, 1212582, 1212583 CVE References: CVE-2022-25881, CVE-2023-30581, CVE-2023-30585, CVE-2023-30588, CVE-2023-30589, CVE-2023-30590, CVE-2023-31124, CVE-2023-31130, CVE-2023-31147, CVE-2023-32067 Sources used: Web and Scripting Module 12 (src): nodejs18-18.16.1-8.9.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:2669-1: An update that solves 10 vulnerabilities and has one fix can now be installed. Category: security (important) Bug References: 1208744, 1211407, 1211604, 1211605, 1211606, 1211607, 1212574, 1212579, 1212581, 1212582, 1212583 CVE References: CVE-2022-25881, CVE-2023-30581, CVE-2023-30585, CVE-2023-30588, CVE-2023-30589, CVE-2023-30590, CVE-2023-31124, CVE-2023-31130, CVE-2023-31147, CVE-2023-32067 Sources used: openSUSE Leap 15.4 (src): nodejs18-18.16.1-150400.9.9.1 openSUSE Leap 15.5 (src): nodejs18-18.16.1-150400.9.9.1 Web and Scripting Module 15-SP4 (src): nodejs18-18.16.1-150400.9.9.1 Web and Scripting Module 15-SP5 (src): nodejs18-18.16.1-150400.9.9.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:2861-1: An update that solves nine vulnerabilities and has one fix can now be installed. Category: security (important) Bug References: 1211407, 1211604, 1211605, 1211606, 1211607, 1212574, 1212579, 1212581, 1212582, 1212583 CVE References: CVE-2023-30581, CVE-2023-30585, CVE-2023-30588, CVE-2023-30589, CVE-2023-30590, CVE-2023-31124, CVE-2023-31130, CVE-2023-31147, CVE-2023-32067 Sources used: SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): nodejs16-16.20.1-150300.7.24.2 SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): nodejs16-16.20.1-150300.7.24.2 SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): nodejs16-16.20.1-150300.7.24.2 SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): nodejs16-16.20.1-150300.7.24.2 SUSE Manager Server 4.2 (src): nodejs16-16.20.1-150300.7.24.2 SUSE Enterprise Storage 7.1 (src): nodejs16-16.20.1-150300.7.24.2 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.