A heap buffer overflow in the c-ares DNS parsing code — tracked as CVE-2020-22217 — lets a malicious name server craft an SOA reply that can crash or destabilize applications that use the vulnerable library, and in some configurations could lead to remote code execution. The bug was found in the...
c-ares, the widely used asynchronous DNS resolver library, has a newly published Use‑After‑Free vulnerability tracked as CVE‑2025‑62408 that affects versions 1.32.3 through 1.34.5 and has been fixed in 1.34.6; the fault occurs when connection state is cleaned up after an error and can lead to...