Source: glibc
Version: 2.42-13
Severity: important
Tags: security upstream
Forwarded: https://sourceware.org/bugzilla/show_bug.cgi?id=34014 
https://sourceware.org/bugzilla/show_bug.cgi?id=3401
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerabilities were published for glibc.

CVE-2026-4437[0]:
| Calling gethostbyaddr or gethostbyaddr_r with a configured
| nsswitch.conf that specifies the library's DNS backend in the GNU C
| Library version 2.34 to version 2.43 could, with a crafted response
| from the configured DNS server, result in a violation of the DNS
| specification that causes the application to treat a non-answer
| section of the DNS response as a valid answer.


CVE-2026-4438[1]:
| Calling gethostbyaddr or gethostbyaddr_r with a configured
| nsswitch.conf that specifies the library's DNS backend in the GNU C
| library version 2.34 to version 2.43 could result in an invalid DNS
| hostname being returned to the caller in violation of the DNS
| specification.

I made only one bug because the (original) patch[2] proposed upstream
covered both.

If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-4437
    https://www.cve.org/CVERecord?id=CVE-2026-4437
[1] https://security-tracker.debian.org/tracker/CVE-2026-4438
    https://www.cve.org/CVERecord?id=CVE-2026-4438
[2] 
https://inbox.sourceware.org/libc-alpha/[email protected]/

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to