ASA-202011-18 log generated external raw

[ASA-202011-18] c-ares: denial of service
Arch Linux Security Advisory ASA-202011-18 ========================================== Severity: Medium Date : 2020-11-19 CVE-ID : CVE-2020-8277 Package : c-ares Type : denial of service Remote : Yes Link : https://security.archlinux.org/AVG-1280 Summary ======= The package c-ares before version 1.17.1-1 is vulnerable to denial of service. Resolution ========== Upgrade to 1.17.1-1. # pacman -Syu "c-ares>=1.17.1-1" The problem has been fixed upstream in version 1.17.1. Workaround ========== None. Description =========== An application that allows an attacker to trigger a DNS request for a host of their choice could trigger a Denial of Service by getting the application to resolve a DNS record with a large number of responses. Impact ====== A remote malicious attacker might be able to crash the application with a crafted DNS response. References ========== https://github.com/c-ares/c-ares/issues/371 https://github.com/c-ares/c-ares/commit/0d252eb3b2147179296a3bdb4ef97883c97c54d3 https://security.archlinux.org/CVE-2020-8277