{"affected":[{"ecosystem_specific":{"binaries":[{"c-ares-devel":"1.17.1+20200724-3.14.1","c-ares-utils":"1.17.1+20200724-3.14.1","libcares2":"1.17.1+20200724-3.14.1","libcares2-32bit":"1.17.1+20200724-3.14.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.3","name":"c-ares","purl":"pkg:rpm/opensuse/c-ares&distro=openSUSE%20Leap%2015.3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.17.1+20200724-3.14.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for c-ares fixes the following issues:\n\nVersion update to git snapshot 1.17.1+20200724:\n\n- CVE-2021-3672: fixed missing input validation on hostnames returned by DNS servers (bsc#1188881)\n- If ares_getaddrinfo() was terminated by an ares_destroy(), it would cause crash\n- Crash in sortaddrinfo() if the list size equals 0 due to an unexpected DNS response\n- Expand number of escaped characters in DNS replies as per RFC1035 5.1 to prevent spoofing\n- Use unbuffered /dev/urandom for random data to prevent early startup performance issues\n","id":"openSUSE-SU-2021:2760-1","modified":"2021-08-17T15:11:37Z","published":"2021-08-17T15:11:37Z","references":[{"type":"ADVISORY","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4F2ZKNNMGENSNMAS5CDHA3CDDRAXF3AQ/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1188881"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-3672"}],"related":["CVE-2021-3672"],"summary":"Security update for c-ares","upstream":["CVE-2021-3672"]}