Bug 2209501 (CVE-2023-31147)

Summary: CVE-2023-31147 c-ares: Insufficient randomness in generation of DNS query IDs
Product: [Other] Security Response Reporter: Sandipan Roy <saroy>
Component: vulnerabilityAssignee: Nobody <nobody>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: atikhono, hhorak, jorton, nodejs-maint
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
A vulnerability was found in c-ares. This issue occurs when /dev/urandom or RtlGenRandom() are unavailable, c-ares will use rand() to generate random numbers used for DNS query ids. This is not a CSPRNG, and it is also not seeded by srand(), so it will generate predictable output.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2209540, 2209541, 2209539, 2209542, 2209543, 2209544, 2209545, 2209546, 2209547, 2209549, 2209550, 2209551, 2209552, 2209553, 2209555, 2211040, 2211041, 2211042, 2211043, 2211044, 2212440, 2212441, 2214632    
Bug Blocks: 2209110    

Description Sandipan Roy 2023-05-24 04:08:42 UTC
Description of issue(s):
When /dev/urandom or RtlGenRandom() are unavailable, c-ares uses rand() to generate random numbers used for DNS query ids. This is not a CSPRNG, and it is also not seeded by srand() so will generate predictable output.
Input from the random number generator is fed into a non-compilant RC4 implementation and may not be as strong as the original RC4 implementation.
No attempt is made to look for modern OS-provided CSPRNGs like arc4random() that is widely available.

CVE-2023-31147 Insufficient randomness in generation of DNS query IDs (https://github.com/c-ares/c-ares/security/advisories/GHSA-8r8p-23f3-64c2)

Comment 1 Sandipan Roy 2023-05-24 04:23:15 UTC
Created c-ares tracking bugs for this issue:

Affects: fedora-all [bug 2209542]


Created mingw-c-ares tracking bugs for this issue:

Affects: fedora-all [bug 2209543]


Created nodejs tracking bugs for this issue:

Affects: epel-7 [bug 2209539]


Created nodejs16 tracking bugs for this issue:

Affects: fedora-all [bug 2209544]


Created nodejs18 tracking bugs for this issue:

Affects: fedora-all [bug 2209545]


Created nodejs20 tracking bugs for this issue:

Affects: fedora-all [bug 2209546]


Created nodejs:13/nodejs tracking bugs for this issue:

Affects: epel-8 [bug 2209540]


Created nodejs:16-epel/nodejs tracking bugs for this issue:

Affects: epel-8 [bug 2209541]


Created nodejs:16/c-ares tracking bugs for this issue:

Affects: fedora-all [bug 2209547]

Comment 4 errata-xmlrpc 2023-06-14 07:27:18 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2023:3577 https://access.redhat.com/errata/RHSA-2023:3577

Comment 5 errata-xmlrpc 2023-06-14 08:39:10 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2023:3586 https://access.redhat.com/errata/RHSA-2023:3586

Comment 7 errata-xmlrpc 2023-07-12 08:12:36 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Extended Update Support

Via RHSA-2023:4036 https://access.redhat.com/errata/RHSA-2023:4036

Comment 8 errata-xmlrpc 2023-07-12 08:24:18 UTC
This issue has been addressed in the following products:

  Red Hat Software Collections for Red Hat Enterprise Linux 7

Via RHSA-2023:4039 https://access.redhat.com/errata/RHSA-2023:4039

Comment 9 errata-xmlrpc 2023-07-12 08:25:20 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2023:4035 https://access.redhat.com/errata/RHSA-2023:4035

Comment 10 errata-xmlrpc 2023-07-12 08:25:31 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2023:4034 https://access.redhat.com/errata/RHSA-2023:4034

Comment 11 errata-xmlrpc 2023-07-12 08:26:15 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Extended Update Support

Via RHSA-2023:4033 https://access.redhat.com/errata/RHSA-2023:4033

Comment 12 errata-xmlrpc 2023-11-07 08:22:18 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2023:6635 https://access.redhat.com/errata/RHSA-2023:6635