A possible use-after-free and double-free in c-ares lib...
Low severity
Unreviewed
Published
May 24, 2022
to the GitHub Advisory Database
•
Updated Sep 15, 2023
Description
Published by the National Vulnerability Database
May 13, 2021
Published to the GitHub Advisory Database
May 24, 2022
Last updated
Sep 15, 2023
A possible use-after-free and double-free in c-ares lib version 1.16.0 if ares_destroy() is called prior to ares_getaddrinfo() completing. This flaw possibly allows an attacker to crash the service that uses c-ares lib. The highest threat from this vulnerability is to this service availability.
References