First published: Tue Dec 13 2022(Updated: )
A flaw was found in the c-ares package. The ares_set_sortlist is missing checks about the validity of the input string, which allows a possible arbitrary length stack overflow. This issue may cause a denial of service or a limited impact on confidentiality and integrity.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/nodejs | <18-9020020230327152102.rhel9 | 18-9020020230327152102.rhel9 |
redhat/nodejs | <1:16.19.1-1.el9_2 | 1:16.19.1-1.el9_2 |
redhat/nodejs | <1:16.20.2-1.el9_0 | 1:16.20.2-1.el9_0 |
redhat/rh-nodejs14 | <0:3.6-2.el7 | 0:3.6-2.el7 |
redhat/rh-nodejs14-nodejs | <0:14.21.3-2.el7 | 0:14.21.3-2.el7 |
c-ares | <1.19.0 | |
Redhat Software Collections | ||
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux | =9.0 | |
Fedoraproject Fedora | =36 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID for this flaw in the c-ares package is CVE-2022-4904.
The severity of CVE-2022-4904 is high with a severity value of 8.6.
CVE-2022-4904 may cause a denial of service or a limited impact on confidentiality and integrity.
The affected software versions include nodejs 18-9020020230327152102.rhel9, nodejs 1:16.19.1-1.el9_2, nodejs 1:16.20.2-1.el9_0, rh-nodejs14 0:3.6-2.el7, and rh-nodejs14-nodejs 0:14.21.3-2.el7.
To fix CVE-2022-4904, it is recommended to update the affected software versions to the specified remedy versions.