CVE-2025-62408

NameCVE-2025-62408
Descriptionc-ares is an asynchronous resolver library. Versions 1.32.3 through 1.34.5 terminate a query after maximum attempts when using read_answer() and process_answer(), which can cause a Denial of Service. This issue is fixed in version 1.34.6.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
c-ares (PTS)bullseye (security), bullseye1.17.1-1+deb11u3fixed
bookworm1.18.1-3fixed
forky, trixie1.34.5-1vulnerable
sid1.34.6-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
c-aressourcebullseye(not affected)
c-aressourcebookworm(not affected)
c-aressource(unstable)1.34.6-1

Notes

[bookworm] - c-ares <not-affected> (Vulnerable code introduced later)
[bullseye] - c-ares <not-affected> (Vulnerable code introduced later)
https://github.com/c-ares/c-ares/security/advisories/GHSA-jq53-42q6-pqr5
Fixed by: https://github.com/c-ares/c-ares/commit/714bf5675c541bd1e668a8db8e67ce012651e618 (main)
Fixed by: https://github.com/c-ares/c-ares/commit/abf004903696383bf701b77b87f2a7ed7aaa1276 (v1.34.6)

Search for package or bug name: Reporting problems