First published: Tue May 10 2022(Updated: )
The c-ares C library defines asynchronous DNS (Domain Name System) requests and provides name resolving API.<br>Security Fix(es):<br><li> c-ares: Missing input validation of host names may lead to domain hijacking (CVE-2021-3672)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.<br>Additional Changes:<br>For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.6 Release Notes linked from the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/c-ares | <1.13.0-6.el8 | 1.13.0-6.el8 |
redhat/c-ares | <1.13.0-6.el8 | 1.13.0-6.el8 |
redhat/c-ares-debuginfo | <1.13.0-6.el8 | 1.13.0-6.el8 |
redhat/c-ares-debuginfo | <1.13.0-6.el8 | 1.13.0-6.el8 |
redhat/c-ares-debugsource | <1.13.0-6.el8 | 1.13.0-6.el8 |
redhat/c-ares-debugsource | <1.13.0-6.el8 | 1.13.0-6.el8 |
redhat/c-ares-devel | <1.13.0-6.el8 | 1.13.0-6.el8 |
redhat/c-ares-devel | <1.13.0-6.el8 | 1.13.0-6.el8 |
redhat/c-ares | <1.13.0-6.el8 | 1.13.0-6.el8 |
redhat/c-ares-debuginfo | <1.13.0-6.el8 | 1.13.0-6.el8 |
redhat/c-ares-debugsource | <1.13.0-6.el8 | 1.13.0-6.el8 |
redhat/c-ares-devel | <1.13.0-6.el8 | 1.13.0-6.el8 |
redhat/c-ares | <1.13.0-6.el8.aa | 1.13.0-6.el8.aa |
redhat/c-ares-debuginfo | <1.13.0-6.el8.aa | 1.13.0-6.el8.aa |
redhat/c-ares-debugsource | <1.13.0-6.el8.aa | 1.13.0-6.el8.aa |
redhat/c-ares-devel | <1.13.0-6.el8.aa | 1.13.0-6.el8.aa |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity level of RHSA-2022:2043 is considered moderate.
To fix RHSA-2022:2043, upgrade to c-ares version 1.13.0-6.el8 or later.
CVE-2021-3672 refers to the missing input validation of host names in the c-ares library that could lead to domain hijacking.
The affected packages include c-ares, c-ares-debuginfo, c-ares-debugsource, and c-ares-devel for various architectures.
The primary mitigation for RHSA-2022:2043 is to regularly update c-ares to the recommended version to prevent potential exploits.