CVE-2023-31147

Summary

CVECVE-2023-31147
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2023-05-25 22:15:00 UTC
Updated2023-10-31 16:06:00 UTC
Descriptionc-ares is an asynchronous resolver library. When /dev/urandom or RtlGenRandom() are unavailable, c-ares uses rand() to generate random numbers used for DNS query ids. This is not a CSPRNG, and it is also not seeded by srand() so will generate predictable output. Input from the random number generator is fed into a non-compilant RC4 implementation and may not be as strong as the original RC4 implementation. No attempt is made to look for modern OS-provided CSPRNGs like arc4random() that is widely available. This issue has been fixed in version 1.19.1.

Risk And Classification

Problem Types: CWE-330

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Application C-ares Project C-ares All All All All
Operating System Fedoraproject Fedora 37 All All All
Operating System Fedoraproject Fedora 38 All All All

References

ReferenceSourceLinkTags
Insufficient randomness in generation of DNS query IDs · Advisory · c-ares/c-ares · GitHub MISC github.com
[SECURITY] Fedora 38 Update: c-ares-1.19.1-1.fc38 - package-announce - Fedora Mailing-Lists MISC lists.fedoraproject.org
Release 1.19.1 · c-ares/c-ares · GitHub MISC github.com
c-ares: Multiple Vulnerabilities (GLSA 202310-09) — Gentoo security MISC security.gentoo.org
[SECURITY] Fedora 37 Update: c-ares-1.19.1-1.fc37 - package-announce - Fedora Mailing-Lists MISC lists.fedoraproject.org
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis

Legacy QID Mappings

  • 160732 Oracle Enterprise Linux Security Update for nodejs (ELSA-2023-3586)
  • 160740 Oracle Enterprise Linux Security Update for 18 (ELSA-2023-3577)
  • 160788 Oracle Enterprise Linux Security Update for nodejs:16 (ELSA-2023-4034)
  • 160794 Oracle Enterprise Linux Security Update for nodejs:18 (ELSA-2023-4035)
  • 161099 Oracle Enterprise Linux Security Update for c-ares (ELSA-2023-6635)
  • 241702 Red Hat Update for nodejs:18 (RHSA-2023:3577)
  • 241724 Red Hat Update for nodejs (RHSA-2023:3586)
  • 241786 Red Hat Update for rh-nodejs14-nodejs (RHSA-2023:4039)
  • 241787 Red Hat Update for nodejs (RHSA-2023:4036)
  • 241788 Red Hat Update for nodejs:18 (RHSA-2023:4035)
  • 241790 Red Hat Update for nodejs:16 (RHSA-2023:4033)
  • 241792 Red Hat Update for nodejs:16 (RHSA-2023:4034)
  • 242322 Red Hat Update for c-ares security (RHSA-2023:6635)
  • 284001 Fedora Security Update for c (FEDORA-2023-ae97529c00)
  • 284101 Fedora Security Update for c (FEDORA-2023-520848815b)
  • 355414 Amazon Linux Security Advisory for c-ares : ALAS2023-2023-198
  • 356117 Amazon Linux Security Advisory for ecs-service-connect-agent : ALAS2023-2023-344
  • 356246 Amazon Linux Security Advisory for ecs-service-connect-agent : ALASECS-2023-007
  • 356504 Amazon Linux Security Advisory for ecs-service-connect-agent : ALAS2ECS-2023-007
  • 673270 EulerOS Security Update for c-ares (EulerOS-SA-2023-2575)
  • 673319 EulerOS Security Update for c-ares (EulerOS-SA-2023-2605)
  • 673489 EulerOS Security Update for c-ares (EulerOS-SA-2023-2828)
  • 673513 EulerOS Security Update for c-ares (EulerOS-SA-2023-2833)
  • 673706 EulerOS Security Update for c-ares (EulerOS-SA-2023-3115)
  • 673890 EulerOS Security Update for c-ares (EulerOS-SA-2023-2780)
  • 674117 EulerOS Security Update for c-ares (EulerOS-SA-2023-2804)
  • 710769 Gentoo Linux c-ares Multiple Vulnerabilities (GLSA 202310-09)
  • 754046 SUSE Enterprise Linux Security Update for c-ares (SUSE-SU-2023:2313-1)
  • 754083 SUSE Enterprise Linux Security Update for libcares2 (SUSE-SU-2023:2477-1)
  • 754181 SUSE Enterprise Linux Security Update for nodejs16 (SUSE-SU-2023:2861-1)
  • 906992 Common Base Linux Mariner (CBL-Mariner) Security Update for c-ares (26869-1)
  • 907007 Common Base Linux Mariner (CBL-Mariner) Security Update for c-ares (26847-1)
  • 907092 Common Base Linux Mariner (CBL-Mariner) Security Update for nodejs (26874-1)
  • 907312 Common Base Linux Mariner (CBL-Mariner) Security Update for nodejs18 (26875-1)
  • 907544 Common Base Linux Mariner (CBL-Mariner) Security Update for fluent-bit (26870-1)
  • 941145 AlmaLinux Security Update for nodejs (ALSA-2023:3586)
  • 941153 AlmaLinux Security Update for nodejs:18 (ALSA-2023:3577)
  • 941168 AlmaLinux Security Update for nodejs:16 (ALSA-2023:4034)
  • 941169 AlmaLinux Security Update for nodejs:18 (ALSA-2023:4035)
  • 941381 AlmaLinux Security Update for c-ares (ALSA-2023:6635)
  • 960945 Rocky Linux Security Update for nodejs:18 (RLSA-2023:3577)
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report