Fedora Linux 8492 Published by

A c-ares security update has been released for Fedora 37.



SECURITY: Fedora 37 Update: c-ares-1.19.0-1.fc37


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2023-b121bd62a9
2023-02-23 02:18:27.224389
--------------------------------------------------------------------------------

Name : c-ares
Product : Fedora 37
Version : 1.19.0
Release : 1.fc37
URL :   http://c-ares.org/
Summary : A library that performs asynchronous DNS operations
Description :
c-ares is a C library that performs DNS requests and name resolves
asynchronously. c-ares is a fork of the library named 'ares', written
by Greg Hudson at MIT.

--------------------------------------------------------------------------------
Update Information:

Update to 1.19.0. Fixes CVE-2022-4904.
--------------------------------------------------------------------------------
ChangeLog:

* Fri Feb 17 2023 Tom Callaway - 1.19.0-1
- update to 1.19.0
- fixes CVE-2022-4904
* Wed Jan 18 2023 Fedora Release Engineering - 1.17.2-4
- Rebuilt for   https://fedoraproject.org/wiki/Fedora_38_Mass_Rebuild
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #2168631 - CVE-2022-4904 c-ares: buffer overflow in config_sortlist() due to missing string length check
  https://bugzilla.redhat.com/show_bug.cgi?id=2168631
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2023-b121bd62a9' at the command
line. For more information, refer to the dnf documentation available at
  http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
  https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________