-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================                   Red Hat Security Advisory

Synopsis:          Moderate: c-ares security update
Advisory ID:       RHSA-2022:2043-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://access.redhat.com/errata/RHSA-2022:2043
Issue date:        2022-05-10
CVE Names:         CVE-2021-3672 
====================================================================
1. Summary:

An update for c-ares is now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux BaseOS (v. 8) - aarch64, ppc64le, s390x, x86_64

3. Description:

The c-ares C library defines asynchronous DNS (Domain Name System) requests
and provides name resolving API.

Security Fix(es):

* c-ares: Missing input validation of host names may lead to domain
hijacking (CVE-2021-3672)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat
Enterprise Linux 8.6 Release Notes linked from the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1988342 - CVE-2021-3672 c-ares: Missing input validation of host names may lead to domain hijacking

6. Package List:

Red Hat Enterprise Linux BaseOS (v. 8):

Source:
c-ares-1.13.0-6.el8.src.rpm

aarch64:
c-ares-1.13.0-6.el8.aarch64.rpm
c-ares-debuginfo-1.13.0-6.el8.aarch64.rpm
c-ares-debugsource-1.13.0-6.el8.aarch64.rpm
c-ares-devel-1.13.0-6.el8.aarch64.rpm

ppc64le:
c-ares-1.13.0-6.el8.ppc64le.rpm
c-ares-debuginfo-1.13.0-6.el8.ppc64le.rpm
c-ares-debugsource-1.13.0-6.el8.ppc64le.rpm
c-ares-devel-1.13.0-6.el8.ppc64le.rpm

s390x:
c-ares-1.13.0-6.el8.s390x.rpm
c-ares-debuginfo-1.13.0-6.el8.s390x.rpm
c-ares-debugsource-1.13.0-6.el8.s390x.rpm
c-ares-devel-1.13.0-6.el8.s390x.rpm

x86_64:
c-ares-1.13.0-6.el8.i686.rpm
c-ares-1.13.0-6.el8.x86_64.rpm
c-ares-debuginfo-1.13.0-6.el8.i686.rpm
c-ares-debuginfo-1.13.0-6.el8.x86_64.rpm
c-ares-debugsource-1.13.0-6.el8.i686.rpm
c-ares-debugsource-1.13.0-6.el8.x86_64.rpm
c-ares-devel-1.13.0-6.el8.i686.rpm
c-ares-devel-1.13.0-6.el8.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2021-3672
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.6_release_notes/

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2022 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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mZ1b
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2022-2043:01 Moderate: c-ares security update

An update for c-ares is now available for Red Hat Enterprise Linux 8

Summary

The c-ares C library defines asynchronous DNS (Domain Name System) requests and provides name resolving API.
Security Fix(es):
* c-ares: Missing input validation of host names may lead to domain hijacking (CVE-2021-3672)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.6 Release Notes linked from the References section.



Summary


Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258

References

https://access.redhat.com/security/cve/CVE-2021-3672 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.6_release_notes/

Package List

Red Hat Enterprise Linux BaseOS (v. 8):
Source: c-ares-1.13.0-6.el8.src.rpm
aarch64: c-ares-1.13.0-6.el8.aarch64.rpm c-ares-debuginfo-1.13.0-6.el8.aarch64.rpm c-ares-debugsource-1.13.0-6.el8.aarch64.rpm c-ares-devel-1.13.0-6.el8.aarch64.rpm
ppc64le: c-ares-1.13.0-6.el8.ppc64le.rpm c-ares-debuginfo-1.13.0-6.el8.ppc64le.rpm c-ares-debugsource-1.13.0-6.el8.ppc64le.rpm c-ares-devel-1.13.0-6.el8.ppc64le.rpm
s390x: c-ares-1.13.0-6.el8.s390x.rpm c-ares-debuginfo-1.13.0-6.el8.s390x.rpm c-ares-debugsource-1.13.0-6.el8.s390x.rpm c-ares-devel-1.13.0-6.el8.s390x.rpm
x86_64: c-ares-1.13.0-6.el8.i686.rpm c-ares-1.13.0-6.el8.x86_64.rpm c-ares-debuginfo-1.13.0-6.el8.i686.rpm c-ares-debuginfo-1.13.0-6.el8.x86_64.rpm c-ares-debugsource-1.13.0-6.el8.i686.rpm c-ares-debugsource-1.13.0-6.el8.x86_64.rpm c-ares-devel-1.13.0-6.el8.i686.rpm c-ares-devel-1.13.0-6.el8.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/


Severity
Advisory ID: RHSA-2022:2043-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2022:2043
Issued Date: : 2022-05-10
CVE Names: CVE-2021-3672

Topic

An update for c-ares is now available for Red Hat Enterprise Linux 8.Red Hat Product Security has rated this update as having a security impactof Moderate. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available for each vulnerability fromthe CVE link(s) in the References section.


Topic


 

Relevant Releases Architectures

Red Hat Enterprise Linux BaseOS (v. 8) - aarch64, ppc64le, s390x, x86_64


Bugs Fixed

1988342 - CVE-2021-3672 c-ares: Missing input validation of host names may lead to domain hijacking


Related News