A flaw was found in the c-ares package. The aressetsortlist is missing checks about the validity of the input string, which allows a possible arbitrary length stack overflow. This issue may cause a denial of service or a limited impact on confidentiality and integrity.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "1.14.0-1ubuntu0.2", "binary_name": "libc-ares-dev" }, { "binary_version": "1.14.0-1ubuntu0.2", "binary_name": "libc-ares2" }, { "binary_version": "1.14.0-1ubuntu0.2", "binary_name": "libc-ares2-dbgsym" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "1.15.0-1ubuntu0.2", "binary_name": "libc-ares-dev" }, { "binary_version": "1.15.0-1ubuntu0.2", "binary_name": "libc-ares2" }, { "binary_version": "1.15.0-1ubuntu0.2", "binary_name": "libc-ares2-dbgsym" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "1.18.1-1ubuntu0.22.04.1", "binary_name": "libc-ares-dev" }, { "binary_version": "1.18.1-1ubuntu0.22.04.1", "binary_name": "libc-ares2" }, { "binary_version": "1.18.1-1ubuntu0.22.04.1", "binary_name": "libc-ares2-dbgsym" } ] }