跳转到帖子

Amazon Linux 2023: CVE-2023-32067: Important priority package update for c-ares (Multiple Advisories)

recommended_posts

发布于
  • Members

Amazon Linux 2023: CVE-2023-32067: Important priority package update for c-ares (Multiple Advisories)

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:C)
Published
05/22/2023
Created
02/14/2025
Added
02/14/2025
Modified
02/14/2025

Description

c-ares is an asynchronous resolver library. c-ares is vulnerable to denial of service. If a target resolver sends a query, the attacker forges a malformed UDP packet with a length of 0 and returns them to the target resolver. The target resolver erroneously interprets the 0 length as a graceful shutdown of the connection. This issue has been patched in version 1.19.1. A vulnerability was found in c-ares. This issue occurs due to a 0-byte UDP payload that can cause a Denial of Service.

Solution(s)

  • amazon-linux-2023-upgrade-c-ares
  • amazon-linux-2023-upgrade-c-ares-debuginfo
  • amazon-linux-2023-upgrade-c-ares-debugsource
  • amazon-linux-2023-upgrade-c-ares-devel
  • amazon-linux-2023-upgrade-ecs-service-connect-agent

References

  • https://attackerkb.com/topics/cve-2023-32067
  • CVE - 2023-32067
  • https://alas.aws.amazon.com/AL2023/ALAS-2023-198.html
  • https://alas.aws.amazon.com/AL2023/ALAS-2023-344.html
  • 查看数 705
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。
注意:你的帖子需要版主批准后才能看到。

游客
回帖…