control: clone -1 -2
control: retitle -1 glibc: CVE-2026-4437
control: retitle -2 glibc: CVE-2026-4438

Hi,

On 2026-03-21 12:41, Salvatore Bonaccorso wrote:
> Source: glibc
> Version: 2.42-13
> Severity: important
> Tags: security upstream
> Forwarded: https://sourceware.org/bugzilla/show_bug.cgi?id=34014 
> https://sourceware.org/bugzilla/show_bug.cgi?id=3401
> X-Debbugs-Cc: [email protected], Debian Security Team 
> <[email protected]>
> 
> Hi,
> 
> The following vulnerabilities were published for glibc.
> 
> CVE-2026-4437[0]:
> | Calling gethostbyaddr or gethostbyaddr_r with a configured
> | nsswitch.conf that specifies the library's DNS backend in the GNU C
> | Library version 2.34 to version 2.43 could, with a crafted response
> | from the configured DNS server, result in a violation of the DNS
> | specification that causes the application to treat a non-answer
> | section of the DNS response as a valid answer.
> 
> 
> CVE-2026-4438[1]:
> | Calling gethostbyaddr or gethostbyaddr_r with a configured
> | nsswitch.conf that specifies the library's DNS backend in the GNU C
> | library version 2.34 to version 2.43 could result in an invalid DNS
> | hostname being returned to the caller in violation of the DNS
> | specification.
> 
> I made only one bug because the (original) patch[2] proposed upstream
> covered both.

At the end the patch got split in to parts, and currently only 
CVE-2026-4437 is fixed. Cloning the bug.

Regards
Aurelien

-- 
Aurelien Jarno                          GPG: 4096R/1DDD8C9B
[email protected]                     http://aurel32.net

Reply via email to