Updated c-ares packages fix security vulnerabilities
Publication date: 08 Jan 2021Modification date: 08 Jan 2021
Type: security
Affected Mageia releases : 7
Description
Avoid read-heap-buffer-overflow in ares_parse_soa_reply found during
fuzzing.
Avoid theoretical buffer overflow in RC4 loop comparison.
Empty hquery->name could lead to invalid memory access.
ares_parse_{a,aaaa}_reply() could return a larger *naddrttls than was
passed in.
References
SRPMS
7/core
- c-ares-1.17.1-1.mga7