Source: c-ares Version: 1.18.1-1 Severity: important Tags: security upstream Forwarded: https://github.com/c-ares/c-ares/pull/497 X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org> Control: fixed -1 1.19.0-1
Hi, The following vulnerability was published for c-ares. CVE-2022-4904[0]: | buffer overflow in config_sortlist() due to missing string length check If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2022-4904 https://www.cve.org/CVERecord?id=CVE-2022-4904 [1] https://github.com/c-ares/c-ares/pull/497 [2] https://github.com/c-ares/c-ares/commit/9903253c347f9e0bffd285ae3829aef251cc852d Regards, Salvatore