Philipp Jeitner and Haya Shulman discovered a flaw in c-ares, a library
that performs DNS requests and name resolution asynchronously. Missing
input validation of hostnames returned by DNS servers can lead to output
of wrong hostnames (leading to Domain Hijacking).
For the stable distribution (buster), this problem has been fixed in
We recommend that you upgrade your c-ares packages.
For the detailed security status of c-ares please refer to its security
tracker page at:
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: [email protected]
Debian Security Advisory DSA-4954-1 [email protected]
https://www.debian.org/security/ Salvatore Bonaccorso
August 10, 2021 https://www.debian.org/security/faq