Vulnerability CVE-2023-31147: Information

Description

c-ares is an asynchronous resolver library. When /dev/urandom or RtlGenRandom() are unavailable, c-ares uses rand() to generate random numbers used for DNS query ids. This is not a CSPRNG, and it is also not seeded by srand() so will generate predictable output. Input from the random number generator is fed into a non-compilant RC4 implementation and may not be as strong as the original RC4 implementation. No attempt is made to look for modern OS-provided CSPRNGs like arc4random() that is widely available. This issue has been fixed in version 1.19.1.

Severity: MEDIUM (6.5) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

Published: May 26, 2023
Modified: Oct. 31, 2023
Error type identifier: CWE-330

Fixed packages

Package name
Branch
Fixed in version
Version from repository
Errata ID
Task #
State
c-aressisyphus1.19.1-alt11.28.1-alt1ALT-PU-2023-4134-1324326Fixed
c-aressisyphus_e2k1.28.1-alt11.28.1-alt1ALT-PU-2024-6354-1-Fixed
c-aressisyphus_riscv641.19.1-alt11.28.1-alt1ALT-PU-2023-4219-1-Fixed
c-aresp101.19.1-alt11.26.0-alt1ALT-PU-2023-4623-3325980Fixed
c-aresc10f11.19.1-alt11.19.1-alt1ALT-PU-2023-5121-4327797Fixed

References to Advisories, Solutions, and Tools

    1. Configuration 1

      cpe:2.3:a:c-ares_project:c-ares:*:*:*:*:*:*:*:*
      End excliding
      1.19.1

      Configuration 2

      cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*

      cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*