Name | CVE-2024-25629 |
Description | c-ares is a C library for asynchronous DNS requests. `ares__read_line()` is used to parse local configuration files such as `/etc/resolv.conf`, `/etc/nsswitch.conf`, the `HOSTALIASES` file, and if using a c-ares version prior to 1.27.0, the `/etc/hosts` file. If any of these configuration files has an embedded `NULL` character as the first character in a new line, it can lead to attempting to read memory prior to the start of the given buffer which may result in a crash. This issue is fixed in c-ares 1.27.0. No known workarounds exist. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
c-ares (PTS) | jessie, jessie (lts) | 1.10.0-2+deb8u7 | vulnerable |
stretch (security) | 1.12.0-1+deb9u2 | vulnerable | |
stretch (lts), stretch | 1.12.0-1+deb9u6 | vulnerable | |
buster (security), buster, buster (lts) | 1.14.0-1+deb10u4 | vulnerable | |
bullseye (security), bullseye | 1.17.1-1+deb11u3 | vulnerable | |
bookworm | 1.18.1-3 | vulnerable | |
sid, trixie | 1.34.2-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
c-ares | source | (unstable) | 1.27.0-1 |
[bookworm] - c-ares <no-dsa> (Minor issue)
[bullseye] - c-ares <no-dsa> (Minor issue)
[buster] - c-ares <no-dsa> (Minor issue)
https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q
https://github.com/c-ares/c-ares/commit/a804c04ddc8245fc8adf0e92368709639125e183 (cares-1_27_0)
[stretch] - c-ares <ignored> (Minor issue)
[jessie] - c-ares <ignored> (Minor issue)