[RHSA-2022:2043] c-ares security update

Severity Moderate
Affected Packages 10
CVEs 1

The c-ares C library defines asynchronous DNS (Domain Name System) requests and provides name resolving API.

Security Fix(es):

  • c-ares: Missing input validation of host names may lead to domain hijacking (CVE-2021-3672)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.6 Release Notes linked from the References section.

Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:rpm/redhat/c-ares?arch=x86_64&distro=redhat-8 redhat c-ares < 1.13.0-6.el8 redhat-8 x86_64
Affected pkg:rpm/redhat/c-ares?arch=s390x&distro=redhat-8 redhat c-ares < 1.13.0-6.el8 redhat-8 s390x
Affected pkg:rpm/redhat/c-ares?arch=ppc64le&distro=redhat-8 redhat c-ares < 1.13.0-6.el8 redhat-8 ppc64le
Affected pkg:rpm/redhat/c-ares?arch=i686&distro=redhat-8 redhat c-ares < 1.13.0-6.el8 redhat-8 i686
Affected pkg:rpm/redhat/c-ares?arch=aarch64&distro=redhat-8 redhat c-ares < 1.13.0-6.el8 redhat-8 aarch64
Affected pkg:rpm/redhat/c-ares-devel?arch=x86_64&distro=redhat-8 redhat c-ares-devel < 1.13.0-6.el8 redhat-8 x86_64
Affected pkg:rpm/redhat/c-ares-devel?arch=s390x&distro=redhat-8 redhat c-ares-devel < 1.13.0-6.el8 redhat-8 s390x
Affected pkg:rpm/redhat/c-ares-devel?arch=ppc64le&distro=redhat-8 redhat c-ares-devel < 1.13.0-6.el8 redhat-8 ppc64le
Affected pkg:rpm/redhat/c-ares-devel?arch=i686&distro=redhat-8 redhat c-ares-devel < 1.13.0-6.el8 redhat-8 i686
Affected pkg:rpm/redhat/c-ares-devel?arch=aarch64&distro=redhat-8 redhat c-ares-devel < 1.13.0-6.el8 redhat-8 aarch64
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...