- -------------------------------------------------------------------------
Debian Security Advisory DSA-4954-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
August 10, 2021                       https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : c-ares
CVE ID         : CVE-2021-3672
Debian Bug     : 992053

Philipp Jeitner and Haya Shulman discovered a flaw in c-ares, a library
that performs DNS requests and name resolution asynchronously. Missing
input validation of hostnames returned by DNS servers can lead to output
of wrong hostnames (leading to Domain Hijacking).

For the stable distribution (buster), this problem has been fixed in
version 1.14.0-1+deb10u1.

We recommend that you upgrade your c-ares packages.

For the detailed security status of c-ares please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/source-package/c-ares

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org

Debian: DSA-4954-1: c-ares security update

August 10, 2021
Philipp Jeitner and Haya Shulman discovered a flaw in c-ares, a library that performs DNS requests and name resolution asynchronously

Summary

For the stable distribution (buster), this problem has been fixed in
version 1.14.0-1+deb10u1.

We recommend that you upgrade your c-ares packages.

For the detailed security status of c-ares please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/source-package/c-ares

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org

Severity
Philipp Jeitner and Haya Shulman discovered a flaw in c-ares, a library
that performs DNS requests and name resolution asynchronously. Missing
input validation of hostnames returned by DNS servers can lead to output
of wrong hostnames (leading to Domain Hijacking).

Related News