Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2026-4437 (GCVE-0-2026-4437)
Vulnerability from cvelistv5 – Published: 2026-03-20 19:59 – Updated: 2026-03-23 15:13
VLAI?
EPSS
Title
gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response
Summary
Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend in the GNU C Library version 2.34 to version 2.43 could, with a crafted response from the configured DNS server, result in a violation of the DNS specification that causes the application to treat a non-answer section of the DNS response as a valid answer.
Severity ?
7.5 (High)
CWE
- CWE-125 - Out-of-bounds read
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| The GNU C Library | glibc |
Affected:
2.34 , ≤ 2.43
(custom)
|
Date Public ?
2026-03-20 22:20
Credits
Antonio Maini (0rbitingZer0) - 0rbitingZer0@proton.me
Kevin Farrell
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2026-4437",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-03-23T15:10:34.650805Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-03-23T15:13:56.930Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "glibc",
"vendor": "The GNU C Library",
"versions": [
{
"lessThanOrEqual": "2.43",
"status": "affected",
"version": "2.34",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Antonio Maini (0rbitingZer0) - 0rbitingZer0@proton.me"
},
{
"lang": "en",
"type": "reporter",
"value": "Kevin Farrell"
}
],
"datePublic": "2026-03-20T22:20:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cdiv\u003eCalling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library\u0027s DNS backend in the GNU C Library version 2.34 to version 2.43 could, with a crafted response from the configured DNS server, result in a violation of the DNS specification that causes the application to treat a non-answer section of the DNS response as a valid answer.\u003cbr\u003e\u003c/div\u003e"
}
],
"value": "Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library\u0027s DNS backend in the GNU C Library version 2.34 to version 2.43 could, with a crafted response from the configured DNS server, result in a violation of the DNS specification that causes the application to treat a non-answer section of the DNS response as a valid answer."
}
],
"impacts": [
{
"capecId": "CAPEC-142",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-142 DNS Cache Poisoning"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-125",
"description": "CWE-125 Out-of-bounds read",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-03-20T19:59:00.427Z",
"orgId": "3ff69d7a-14f2-4f67-a097-88dee7810d18",
"shortName": "glibc"
},
"references": [
{
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=34014"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response",
"x_generator": {
"engine": "Vulnogram 1.0.1"
}
}
},
"cveMetadata": {
"assignerOrgId": "3ff69d7a-14f2-4f67-a097-88dee7810d18",
"assignerShortName": "glibc",
"cveId": "CVE-2026-4437",
"datePublished": "2026-03-20T19:59:00.427Z",
"dateReserved": "2026-03-19T19:55:42.906Z",
"dateUpdated": "2026-03-23T15:13:56.930Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2026-4437",
"date": "2026-04-15",
"epss": "0.00046",
"percentile": "0.1405"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2026-4437\",\"sourceIdentifier\":\"3ff69d7a-14f2-4f67-a097-88dee7810d18\",\"published\":\"2026-03-20T20:16:49.477\",\"lastModified\":\"2026-04-07T18:41:36.647\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library\u0027s DNS backend in the GNU C Library version 2.34 to version 2.43 could, with a crafted response from the configured DNS server, result in a violation of the DNS specification that causes the application to treat a non-answer section of the DNS response as a valid answer.\"},{\"lang\":\"es\",\"value\":\"Llamar a gethostbyaddr o gethostbyaddr_r con un nsswitch.conf configurado que especifica el backend DNS de la biblioteca en la GNU C Library versi\u00f3n 2.34 a la versi\u00f3n 2.43 podr\u00eda, con una respuesta manipulada del servidor DNS configurado, resultar en una violaci\u00f3n de la especificaci\u00f3n DNS que hace que la aplicaci\u00f3n trate una secci\u00f3n que no es de respuesta de la respuesta DNS como una respuesta v\u00e1lida.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"3ff69d7a-14f2-4f67-a097-88dee7810d18\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-125\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.34\",\"versionEndIncluding\":\"2.43\",\"matchCriteriaId\":\"1ECF98C3-1D14-492E-9FE0-241B03BF8550\"}]}]}],\"references\":[{\"url\":\"https://sourceware.org/bugzilla/show_bug.cgi?id=34014\",\"source\":\"3ff69d7a-14f2-4f67-a097-88dee7810d18\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Patch\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-4437\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-03-23T15:10:34.650805Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-03-23T15:10:49.136Z\"}}], \"cna\": {\"title\": \"gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Antonio Maini (0rbitingZer0) - 0rbitingZer0@proton.me\"}, {\"lang\": \"en\", \"type\": \"reporter\", \"value\": \"Kevin Farrell\"}], \"impacts\": [{\"capecId\": \"CAPEC-142\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-142 DNS Cache Poisoning\"}]}], \"affected\": [{\"vendor\": \"The GNU C Library\", \"product\": \"glibc\", \"versions\": [{\"status\": \"affected\", \"version\": \"2.34\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"2.43\"}], \"defaultStatus\": \"unaffected\"}], \"datePublic\": \"2026-03-20T22:20:00.000Z\", \"references\": [{\"url\": \"https://sourceware.org/bugzilla/show_bug.cgi?id=34014\"}], \"x_generator\": {\"engine\": \"Vulnogram 1.0.1\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library\u0027s DNS backend in the GNU C Library version 2.34 to version 2.43 could, with a crafted response from the configured DNS server, result in a violation of the DNS specification that causes the application to treat a non-answer section of the DNS response as a valid answer.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cdiv\u003eCalling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library\u0027s DNS backend in the GNU C Library version 2.34 to version 2.43 could, with a crafted response from the configured DNS server, result in a violation of the DNS specification that causes the application to treat a non-answer section of the DNS response as a valid answer.\u003cbr\u003e\u003c/div\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-125\", \"description\": \"CWE-125 Out-of-bounds read\"}]}], \"providerMetadata\": {\"orgId\": \"3ff69d7a-14f2-4f67-a097-88dee7810d18\", \"shortName\": \"glibc\", \"dateUpdated\": \"2026-03-20T19:59:00.427Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2026-4437\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-03-23T15:13:56.930Z\", \"dateReserved\": \"2026-03-19T19:55:42.906Z\", \"assignerOrgId\": \"3ff69d7a-14f2-4f67-a097-88dee7810d18\", \"datePublished\": \"2026-03-20T19:59:00.427Z\", \"assignerShortName\": \"glibc\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
CERTFR-2026-AVI-0376
Vulnerability from certfr_avis - Published: 2026-03-30 - Updated: 2026-03-30
De multiples vulnérabilités ont été découvertes dans les produits Microsoft. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Impacted products
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | CBL Mariner | cbl2 telegraf 1.29.4-21 versions antérieures à 1.29.4-22 | ||
| Microsoft | Azure Linux | azl3 glibc 2.38-18 versions antérieures à 2.38-19 | ||
| Microsoft | Azure Linux | azl3 squid 6.13-3 versions antérieures à 6.13-4 | ||
| Microsoft | Azure Linux | azl3 python-pyasn1 0.4.8-1 versions antérieures à 0.4.8-2 | ||
| Microsoft | Azure Linux | azl3 nginx 1.28.2-1 versions antérieures à 1.28.3-1 | ||
| Microsoft | CBL Mariner | cbl2 ncurses 6.4-3 versions antérieures à 6.4-4 | ||
| Microsoft | Azure Linux | azl3 kernel 6.6.126.1-1 versions antérieures à 6.6.130.1-1 | ||
| Microsoft | Azure Linux | azl3 ncurses 6.4-2 versions antérieures à 6.4-3 | ||
| Microsoft | CBL Mariner | cbl2 terraform 1.3.2-29 versions antérieures à 1.3.2-30 | ||
| Microsoft | Azure Linux | azl3 libsoup 3.4.4-12 versions antérieures à 3.4.4-14 | ||
| Microsoft | Azure Linux | azl3 etcd 3.5.21-1 versions antérieures à 3.5.28-1 |
References
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "cbl2 telegraf 1.29.4-21 versions ant\u00e9rieures \u00e0 1.29.4-22",
"product": {
"name": "CBL Mariner",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 glibc 2.38-18 versions ant\u00e9rieures \u00e0 2.38-19",
"product": {
"name": "Azure Linux",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 squid 6.13-3 versions ant\u00e9rieures \u00e0 6.13-4",
"product": {
"name": "Azure Linux",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 python-pyasn1 0.4.8-1 versions ant\u00e9rieures \u00e0 0.4.8-2",
"product": {
"name": "Azure Linux",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 nginx 1.28.2-1 versions ant\u00e9rieures \u00e0 1.28.3-1",
"product": {
"name": "Azure Linux",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 ncurses 6.4-3 versions ant\u00e9rieures \u00e0 6.4-4",
"product": {
"name": "CBL Mariner",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 kernel 6.6.126.1-1 versions ant\u00e9rieures \u00e0 6.6.130.1-1",
"product": {
"name": "Azure Linux",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 ncurses 6.4-2 versions ant\u00e9rieures \u00e0 6.4-3",
"product": {
"name": "Azure Linux",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 terraform 1.3.2-29 versions ant\u00e9rieures \u00e0 1.3.2-30",
"product": {
"name": "CBL Mariner",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 libsoup 3.4.4-12 versions ant\u00e9rieures \u00e0 3.4.4-14",
"product": {
"name": "Azure Linux",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 etcd 3.5.21-1 versions ant\u00e9rieures \u00e0 3.5.28-1",
"product": {
"name": "Azure Linux",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2026-23318",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23318"
},
{
"name": "CVE-2026-23368",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23368"
},
{
"name": "CVE-2026-23281",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23281"
},
{
"name": "CVE-2026-32647",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32647"
},
{
"name": "CVE-2026-23269",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23269"
},
{
"name": "CVE-2026-23293",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23293"
},
{
"name": "CVE-2026-23290",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23290"
},
{
"name": "CVE-2026-27651",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27651"
},
{
"name": "CVE-2026-23303",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23303"
},
{
"name": "CVE-2026-27654",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27654"
},
{
"name": "CVE-2026-23340",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23340"
},
{
"name": "CVE-2026-23253",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23253"
},
{
"name": "CVE-2026-33343",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33343"
},
{
"name": "CVE-2026-23271",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23271"
},
{
"name": "CVE-2026-23268",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23268"
},
{
"name": "CVE-2026-23285",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23285"
},
{
"name": "CVE-2026-23304",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23304"
},
{
"name": "CVE-2026-23357",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23357"
},
{
"name": "CVE-2026-4645",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4645"
},
{
"name": "CVE-2026-23324",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23324"
},
{
"name": "CVE-2026-23347",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23347"
},
{
"name": "CVE-2026-28755",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28755"
},
{
"name": "CVE-2026-23317",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23317"
},
{
"name": "CVE-2026-23334",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23334"
},
{
"name": "CVE-2026-23391",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23391"
},
{
"name": "CVE-2026-23319",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23319"
},
{
"name": "CVE-2026-23279",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23279"
},
{
"name": "CVE-2026-23244",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23244"
},
{
"name": "CVE-2026-23246",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23246"
},
{
"name": "CVE-2026-30922",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-30922"
},
{
"name": "CVE-2026-23286",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23286"
},
{
"name": "CVE-2026-23359",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23359"
},
{
"name": "CVE-2026-23298",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23298"
},
{
"name": "CVE-2026-23296",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23296"
},
{
"name": "CVE-2026-23396",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23396"
},
{
"name": "CVE-2026-23370",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23370"
},
{
"name": "CVE-2026-23315",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23315"
},
{
"name": "CVE-2026-23352",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23352"
},
{
"name": "CVE-2026-23367",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23367"
},
{
"name": "CVE-2026-32748",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32748"
},
{
"name": "CVE-2026-23300",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23300"
},
{
"name": "CVE-2026-23379",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23379"
},
{
"name": "CVE-2026-23381",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23381"
},
{
"name": "CVE-2026-23392",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23392"
},
{
"name": "CVE-2026-23245",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23245"
},
{
"name": "CVE-2026-4438",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4438"
},
{
"name": "CVE-2026-23364",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23364"
},
{
"name": "CVE-2026-23274",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23274"
},
{
"name": "CVE-2026-23284",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23284"
},
{
"name": "CVE-2026-23397",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23397"
},
{
"name": "CVE-2026-23343",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23343"
},
{
"name": "CVE-2026-23336",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23336"
},
{
"name": "CVE-2025-69720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69720"
},
{
"name": "CVE-2026-23289",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23289"
},
{
"name": "CVE-2026-23292",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23292"
},
{
"name": "CVE-2026-23277",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23277"
},
{
"name": "CVE-2026-4437",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4437"
},
{
"name": "CVE-2026-27784",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27784"
},
{
"name": "CVE-2026-23388",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23388"
},
{
"name": "CVE-2026-28753",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28753"
},
{
"name": "CVE-2026-33526",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33526"
},
{
"name": "CVE-2026-23310",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23310"
},
{
"name": "CVE-2026-2369",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2369"
},
{
"name": "CVE-2026-33515",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33515"
},
{
"name": "CVE-2026-23395",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23395"
},
{
"name": "CVE-2026-23100",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23100"
},
{
"name": "CVE-2026-23306",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23306"
},
{
"name": "CVE-2026-33413",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33413"
},
{
"name": "CVE-2026-23291",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23291"
},
{
"name": "CVE-2026-23382",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23382"
},
{
"name": "CVE-2026-23312",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23312"
},
{
"name": "CVE-2026-23365",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23365"
},
{
"name": "CVE-2026-23356",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23356"
},
{
"name": "CVE-2026-23307",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23307"
},
{
"name": "CVE-2026-23398",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23398"
},
{
"name": "CVE-2026-23351",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23351"
},
{
"name": "CVE-2026-23390",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23390"
}
],
"initial_release_date": "2026-03-30T00:00:00",
"last_revision_date": "2026-03-30T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0376",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-03-30T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Microsoft. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Microsoft",
"vendor_advisories": [
{
"published_at": "2026-03-27",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-32748",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32748"
},
{
"published_at": "2026-03-22",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-4438",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-4438"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23347",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23347"
},
{
"published_at": "2026-03-20",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23268",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23268"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23392",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23392"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23319",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23319"
},
{
"published_at": "2026-03-20",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23253",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23253"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23296",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23296"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23364",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23364"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23368",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23368"
},
{
"published_at": "2026-03-27",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-27654",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27654"
},
{
"published_at": "2026-03-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-30922",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-30922"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23286",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23286"
},
{
"published_at": "2026-03-27",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23396",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23396"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23340",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23340"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23324",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23324"
},
{
"published_at": "2026-03-27",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-33515",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33515"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23318",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23318"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23379",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23379"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23317",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23317"
},
{
"published_at": "2026-03-27",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-27784",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27784"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23359",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23359"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23245",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23245"
},
{
"published_at": "2026-03-20",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23269",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23269"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23298",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23298"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23304",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23304"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23370",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23370"
},
{
"published_at": "2026-03-22",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23100",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23100"
},
{
"published_at": "2026-03-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23271",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23271"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23352",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23352"
},
{
"published_at": "2026-03-28",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-33343",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33343"
},
{
"published_at": "2026-03-22",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-4437",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-4437"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23343",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23343"
},
{
"published_at": "2026-03-28",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-33413",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33413"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23246",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23246"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23279",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23279"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23244",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23244"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23367",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23367"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23307",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23307"
},
{
"published_at": "2026-03-27",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23398",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23398"
},
{
"published_at": "2026-03-25",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-69720",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-69720"
},
{
"published_at": "2026-03-27",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-28755",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-28755"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23300",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23300"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23381",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23381"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23356",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23356"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23351",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23351"
},
{
"published_at": "2026-03-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23277",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23277"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23315",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23315"
},
{
"published_at": "2026-03-27",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-4645",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-4645"
},
{
"published_at": "2026-03-27",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-33526",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33526"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23382",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23382"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23310",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23310"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23306",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23306"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23336",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23336"
},
{
"published_at": "2026-03-25",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-2369",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-2369"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23391",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23391"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23290",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23290"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23312",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23312"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23388",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23388"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23390",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23390"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23303",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23303"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23289",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23289"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23293",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23293"
},
{
"published_at": "2026-03-27",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-27651",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27651"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23291",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23291"
},
{
"published_at": "2026-03-27",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-28753",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-28753"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23334",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23334"
},
{
"published_at": "2026-03-27",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-32647",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32647"
},
{
"published_at": "2026-03-27",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23397",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23397"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23281",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23281"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23365",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23365"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23285",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23285"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23292",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23292"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23284",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23284"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23395",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23395"
},
{
"published_at": "2026-03-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23274",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23274"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23357",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23357"
}
]
}
GHSA-M5WQ-R4R4-4QRH
Vulnerability from github – Published: 2026-03-20 21:31 – Updated: 2026-03-23 18:30
VLAI?
Details
Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend in the GNU C Library version 2.34 to version 2.43 could, with a crafted response from the configured DNS server, result in a violation of the DNS specification that causes the application to treat a non-answer section of the DNS response as a valid answer.
Severity ?
7.5 (High)
{
"affected": [],
"aliases": [
"CVE-2026-4437"
],
"database_specific": {
"cwe_ids": [
"CWE-125"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2026-03-20T20:16:49Z",
"severity": "HIGH"
},
"details": "Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library\u0027s DNS backend in the GNU C Library version 2.34 to version 2.43 could, with a crafted response from the configured DNS server, result in a violation of the DNS specification that causes the application to treat a non-answer section of the DNS response as a valid answer.",
"id": "GHSA-m5wq-r4r4-4qrh",
"modified": "2026-03-23T18:30:29Z",
"published": "2026-03-20T21:31:28Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4437"
},
{
"type": "WEB",
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=34014"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
FKIE_CVE-2026-4437
Vulnerability from fkie_nvd - Published: 2026-03-20 20:16 - Updated: 2026-04-07 18:41
Severity ?
Summary
Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend in the GNU C Library version 2.34 to version 2.43 could, with a crafted response from the configured DNS server, result in a violation of the DNS specification that causes the application to treat a non-answer section of the DNS response as a valid answer.
References
| URL | Tags | ||
|---|---|---|---|
| 3ff69d7a-14f2-4f67-a097-88dee7810d18 | https://sourceware.org/bugzilla/show_bug.cgi?id=34014 | Exploit, Issue Tracking, Patch |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1ECF98C3-1D14-492E-9FE0-241B03BF8550",
"versionEndIncluding": "2.43",
"versionStartIncluding": "2.34",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library\u0027s DNS backend in the GNU C Library version 2.34 to version 2.43 could, with a crafted response from the configured DNS server, result in a violation of the DNS specification that causes the application to treat a non-answer section of the DNS response as a valid answer."
},
{
"lang": "es",
"value": "Llamar a gethostbyaddr o gethostbyaddr_r con un nsswitch.conf configurado que especifica el backend DNS de la biblioteca en la GNU C Library versi\u00f3n 2.34 a la versi\u00f3n 2.43 podr\u00eda, con una respuesta manipulada del servidor DNS configurado, resultar en una violaci\u00f3n de la especificaci\u00f3n DNS que hace que la aplicaci\u00f3n trate una secci\u00f3n que no es de respuesta de la respuesta DNS como una respuesta v\u00e1lida."
}
],
"id": "CVE-2026-4437",
"lastModified": "2026-04-07T18:41:36.647",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2026-03-20T20:16:49.477",
"references": [
{
"source": "3ff69d7a-14f2-4f67-a097-88dee7810d18",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=34014"
}
],
"sourceIdentifier": "3ff69d7a-14f2-4f67-a097-88dee7810d18",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-125"
}
],
"source": "3ff69d7a-14f2-4f67-a097-88dee7810d18",
"type": "Secondary"
}
]
}
SUSE-SU-2026:21069-1
Vulnerability from csaf_suse - Published: 2026-04-09 11:02 - Updated: 2026-04-09 11:02Summary
Security update for glibc
Severity
Important
Notes
Title of the patch: Security update for glibc
Description of the patch: This update for glibc fixes the following issues:
- CVE-2026-4437: incorrect DNS response parsing via crafted DNS server response (bsc#1260078).
- CVE-2026-4438: invalid DNS hostname returned via gethostbyaddr functions (bsc#1260082).
Patchnames: SUSE-SLE-Micro-6.0-659
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
4.7 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.7 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
| URL | Category | ||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for glibc",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for glibc fixes the following issues:\n\n- CVE-2026-4437: incorrect DNS response parsing via crafted DNS server response (bsc#1260078).\n- CVE-2026-4438: invalid DNS hostname returned via gethostbyaddr functions (bsc#1260082).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Micro-6.0-659",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_21069-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:21069-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202621069-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:21069-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2026-April/045455.html"
},
{
"category": "self",
"summary": "SUSE Bug 1260078",
"url": "https://bugzilla.suse.com/1260078"
},
{
"category": "self",
"summary": "SUSE Bug 1260082",
"url": "https://bugzilla.suse.com/1260082"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-4437 page",
"url": "https://www.suse.com/security/cve/CVE-2026-4437/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-4438 page",
"url": "https://www.suse.com/security/cve/CVE-2026-4438/"
}
],
"title": "Security update for glibc",
"tracking": {
"current_release_date": "2026-04-09T11:02:01Z",
"generator": {
"date": "2026-04-09T11:02:01Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:21069-1",
"initial_release_date": "2026-04-09T11:02:01Z",
"revision_history": [
{
"date": "2026-04-09T11:02:01Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "glibc-2.38-12.1.aarch64",
"product": {
"name": "glibc-2.38-12.1.aarch64",
"product_id": "glibc-2.38-12.1.aarch64"
}
},
{
"category": "product_version",
"name": "glibc-devel-2.38-12.1.aarch64",
"product": {
"name": "glibc-devel-2.38-12.1.aarch64",
"product_id": "glibc-devel-2.38-12.1.aarch64"
}
},
{
"category": "product_version",
"name": "glibc-locale-2.38-12.1.aarch64",
"product": {
"name": "glibc-locale-2.38-12.1.aarch64",
"product_id": "glibc-locale-2.38-12.1.aarch64"
}
},
{
"category": "product_version",
"name": "glibc-locale-base-2.38-12.1.aarch64",
"product": {
"name": "glibc-locale-base-2.38-12.1.aarch64",
"product_id": "glibc-locale-base-2.38-12.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "glibc-2.38-12.1.s390x",
"product": {
"name": "glibc-2.38-12.1.s390x",
"product_id": "glibc-2.38-12.1.s390x"
}
},
{
"category": "product_version",
"name": "glibc-devel-2.38-12.1.s390x",
"product": {
"name": "glibc-devel-2.38-12.1.s390x",
"product_id": "glibc-devel-2.38-12.1.s390x"
}
},
{
"category": "product_version",
"name": "glibc-locale-2.38-12.1.s390x",
"product": {
"name": "glibc-locale-2.38-12.1.s390x",
"product_id": "glibc-locale-2.38-12.1.s390x"
}
},
{
"category": "product_version",
"name": "glibc-locale-base-2.38-12.1.s390x",
"product": {
"name": "glibc-locale-base-2.38-12.1.s390x",
"product_id": "glibc-locale-base-2.38-12.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "glibc-2.38-12.1.x86_64",
"product": {
"name": "glibc-2.38-12.1.x86_64",
"product_id": "glibc-2.38-12.1.x86_64"
}
},
{
"category": "product_version",
"name": "glibc-devel-2.38-12.1.x86_64",
"product": {
"name": "glibc-devel-2.38-12.1.x86_64",
"product_id": "glibc-devel-2.38-12.1.x86_64"
}
},
{
"category": "product_version",
"name": "glibc-locale-2.38-12.1.x86_64",
"product": {
"name": "glibc-locale-2.38-12.1.x86_64",
"product_id": "glibc-locale-2.38-12.1.x86_64"
}
},
{
"category": "product_version",
"name": "glibc-locale-base-2.38-12.1.x86_64",
"product": {
"name": "glibc-locale-base-2.38-12.1.x86_64",
"product_id": "glibc-locale-base-2.38-12.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Micro 6.0",
"product": {
"name": "SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sl-micro:6.0"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-2.38-12.1.aarch64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:glibc-2.38-12.1.aarch64"
},
"product_reference": "glibc-2.38-12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-2.38-12.1.s390x as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:glibc-2.38-12.1.s390x"
},
"product_reference": "glibc-2.38-12.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-2.38-12.1.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:glibc-2.38-12.1.x86_64"
},
"product_reference": "glibc-2.38-12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-2.38-12.1.aarch64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:glibc-devel-2.38-12.1.aarch64"
},
"product_reference": "glibc-devel-2.38-12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-2.38-12.1.s390x as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:glibc-devel-2.38-12.1.s390x"
},
"product_reference": "glibc-devel-2.38-12.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-2.38-12.1.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:glibc-devel-2.38-12.1.x86_64"
},
"product_reference": "glibc-devel-2.38-12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-2.38-12.1.aarch64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:glibc-locale-2.38-12.1.aarch64"
},
"product_reference": "glibc-locale-2.38-12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-2.38-12.1.s390x as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:glibc-locale-2.38-12.1.s390x"
},
"product_reference": "glibc-locale-2.38-12.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-2.38-12.1.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:glibc-locale-2.38-12.1.x86_64"
},
"product_reference": "glibc-locale-2.38-12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-base-2.38-12.1.aarch64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:glibc-locale-base-2.38-12.1.aarch64"
},
"product_reference": "glibc-locale-base-2.38-12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-base-2.38-12.1.s390x as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:glibc-locale-base-2.38-12.1.s390x"
},
"product_reference": "glibc-locale-base-2.38-12.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-base-2.38-12.1.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:glibc-locale-base-2.38-12.1.x86_64"
},
"product_reference": "glibc-locale-base-2.38-12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-4437",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-4437"
}
],
"notes": [
{
"category": "general",
"text": "Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library\u0027s DNS backend in the GNU C Library version 2.34 to version 2.43 could, with a crafted response from the configured DNS server, result in a violation of the DNS specification that causes the application to treat a non-answer section of the DNS response as a valid answer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:glibc-2.38-12.1.aarch64",
"SUSE Linux Micro 6.0:glibc-2.38-12.1.s390x",
"SUSE Linux Micro 6.0:glibc-2.38-12.1.x86_64",
"SUSE Linux Micro 6.0:glibc-devel-2.38-12.1.aarch64",
"SUSE Linux Micro 6.0:glibc-devel-2.38-12.1.s390x",
"SUSE Linux Micro 6.0:glibc-devel-2.38-12.1.x86_64",
"SUSE Linux Micro 6.0:glibc-locale-2.38-12.1.aarch64",
"SUSE Linux Micro 6.0:glibc-locale-2.38-12.1.s390x",
"SUSE Linux Micro 6.0:glibc-locale-2.38-12.1.x86_64",
"SUSE Linux Micro 6.0:glibc-locale-base-2.38-12.1.aarch64",
"SUSE Linux Micro 6.0:glibc-locale-base-2.38-12.1.s390x",
"SUSE Linux Micro 6.0:glibc-locale-base-2.38-12.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-4437",
"url": "https://www.suse.com/security/cve/CVE-2026-4437"
},
{
"category": "external",
"summary": "SUSE Bug 1260078 for CVE-2026-4437",
"url": "https://bugzilla.suse.com/1260078"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:glibc-2.38-12.1.aarch64",
"SUSE Linux Micro 6.0:glibc-2.38-12.1.s390x",
"SUSE Linux Micro 6.0:glibc-2.38-12.1.x86_64",
"SUSE Linux Micro 6.0:glibc-devel-2.38-12.1.aarch64",
"SUSE Linux Micro 6.0:glibc-devel-2.38-12.1.s390x",
"SUSE Linux Micro 6.0:glibc-devel-2.38-12.1.x86_64",
"SUSE Linux Micro 6.0:glibc-locale-2.38-12.1.aarch64",
"SUSE Linux Micro 6.0:glibc-locale-2.38-12.1.s390x",
"SUSE Linux Micro 6.0:glibc-locale-2.38-12.1.x86_64",
"SUSE Linux Micro 6.0:glibc-locale-base-2.38-12.1.aarch64",
"SUSE Linux Micro 6.0:glibc-locale-base-2.38-12.1.s390x",
"SUSE Linux Micro 6.0:glibc-locale-base-2.38-12.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:glibc-2.38-12.1.aarch64",
"SUSE Linux Micro 6.0:glibc-2.38-12.1.s390x",
"SUSE Linux Micro 6.0:glibc-2.38-12.1.x86_64",
"SUSE Linux Micro 6.0:glibc-devel-2.38-12.1.aarch64",
"SUSE Linux Micro 6.0:glibc-devel-2.38-12.1.s390x",
"SUSE Linux Micro 6.0:glibc-devel-2.38-12.1.x86_64",
"SUSE Linux Micro 6.0:glibc-locale-2.38-12.1.aarch64",
"SUSE Linux Micro 6.0:glibc-locale-2.38-12.1.s390x",
"SUSE Linux Micro 6.0:glibc-locale-2.38-12.1.x86_64",
"SUSE Linux Micro 6.0:glibc-locale-base-2.38-12.1.aarch64",
"SUSE Linux Micro 6.0:glibc-locale-base-2.38-12.1.s390x",
"SUSE Linux Micro 6.0:glibc-locale-base-2.38-12.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-09T11:02:01Z",
"details": "moderate"
}
],
"title": "CVE-2026-4437"
},
{
"cve": "CVE-2026-4438",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-4438"
}
],
"notes": [
{
"category": "general",
"text": "Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library\u0027s DNS backend in the GNU C library version 2.34 to version 2.43 could result in an invalid DNS hostname being returned to the caller in violation of the DNS specification.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:glibc-2.38-12.1.aarch64",
"SUSE Linux Micro 6.0:glibc-2.38-12.1.s390x",
"SUSE Linux Micro 6.0:glibc-2.38-12.1.x86_64",
"SUSE Linux Micro 6.0:glibc-devel-2.38-12.1.aarch64",
"SUSE Linux Micro 6.0:glibc-devel-2.38-12.1.s390x",
"SUSE Linux Micro 6.0:glibc-devel-2.38-12.1.x86_64",
"SUSE Linux Micro 6.0:glibc-locale-2.38-12.1.aarch64",
"SUSE Linux Micro 6.0:glibc-locale-2.38-12.1.s390x",
"SUSE Linux Micro 6.0:glibc-locale-2.38-12.1.x86_64",
"SUSE Linux Micro 6.0:glibc-locale-base-2.38-12.1.aarch64",
"SUSE Linux Micro 6.0:glibc-locale-base-2.38-12.1.s390x",
"SUSE Linux Micro 6.0:glibc-locale-base-2.38-12.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-4438",
"url": "https://www.suse.com/security/cve/CVE-2026-4438"
},
{
"category": "external",
"summary": "SUSE Bug 1260082 for CVE-2026-4438",
"url": "https://bugzilla.suse.com/1260082"
},
{
"category": "external",
"summary": "SUSE Bug 1260333 for CVE-2026-4438",
"url": "https://bugzilla.suse.com/1260333"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:glibc-2.38-12.1.aarch64",
"SUSE Linux Micro 6.0:glibc-2.38-12.1.s390x",
"SUSE Linux Micro 6.0:glibc-2.38-12.1.x86_64",
"SUSE Linux Micro 6.0:glibc-devel-2.38-12.1.aarch64",
"SUSE Linux Micro 6.0:glibc-devel-2.38-12.1.s390x",
"SUSE Linux Micro 6.0:glibc-devel-2.38-12.1.x86_64",
"SUSE Linux Micro 6.0:glibc-locale-2.38-12.1.aarch64",
"SUSE Linux Micro 6.0:glibc-locale-2.38-12.1.s390x",
"SUSE Linux Micro 6.0:glibc-locale-2.38-12.1.x86_64",
"SUSE Linux Micro 6.0:glibc-locale-base-2.38-12.1.aarch64",
"SUSE Linux Micro 6.0:glibc-locale-base-2.38-12.1.s390x",
"SUSE Linux Micro 6.0:glibc-locale-base-2.38-12.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:glibc-2.38-12.1.aarch64",
"SUSE Linux Micro 6.0:glibc-2.38-12.1.s390x",
"SUSE Linux Micro 6.0:glibc-2.38-12.1.x86_64",
"SUSE Linux Micro 6.0:glibc-devel-2.38-12.1.aarch64",
"SUSE Linux Micro 6.0:glibc-devel-2.38-12.1.s390x",
"SUSE Linux Micro 6.0:glibc-devel-2.38-12.1.x86_64",
"SUSE Linux Micro 6.0:glibc-locale-2.38-12.1.aarch64",
"SUSE Linux Micro 6.0:glibc-locale-2.38-12.1.s390x",
"SUSE Linux Micro 6.0:glibc-locale-2.38-12.1.x86_64",
"SUSE Linux Micro 6.0:glibc-locale-base-2.38-12.1.aarch64",
"SUSE Linux Micro 6.0:glibc-locale-base-2.38-12.1.s390x",
"SUSE Linux Micro 6.0:glibc-locale-base-2.38-12.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-09T11:02:01Z",
"details": "moderate"
}
],
"title": "CVE-2026-4438"
}
]
}
SUSE-SU-2026:21019-1
Vulnerability from csaf_suse - Published: 2026-04-10 06:44 - Updated: 2026-04-10 06:44Summary
Security update for glibc
Severity
Important
Notes
Title of the patch: Security update for glibc
Description of the patch: This update for glibc fixes the following issues:
Security fixes:
- CVE-2026-4437: incorrect DNS response parsing via crafted DNS server response (bsc#1260078).
- CVE-2026-4438: invalid DNS hostname returned via gethostbyaddr functions (bsc#1260082).
Other fixes:
- nss: Missing checks in __nss_configure_lookup, __nss_database_get (bsc#1258319).
Patchnames: SUSE-SL-Micro-6.2-516
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
4.7 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.7 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for glibc",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for glibc fixes the following issues:\n\nSecurity fixes:\n\n- CVE-2026-4437: incorrect DNS response parsing via crafted DNS server response (bsc#1260078).\n- CVE-2026-4438: invalid DNS hostname returned via gethostbyaddr functions (bsc#1260082).\n\nOther fixes:\n\n- nss: Missing checks in __nss_configure_lookup, __nss_database_get (bsc#1258319).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SL-Micro-6.2-516",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_21019-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:21019-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202621019-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:21019-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2026-April/045387.html"
},
{
"category": "self",
"summary": "SUSE Bug 1258319",
"url": "https://bugzilla.suse.com/1258319"
},
{
"category": "self",
"summary": "SUSE Bug 1260078",
"url": "https://bugzilla.suse.com/1260078"
},
{
"category": "self",
"summary": "SUSE Bug 1260082",
"url": "https://bugzilla.suse.com/1260082"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-4437 page",
"url": "https://www.suse.com/security/cve/CVE-2026-4437/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-4438 page",
"url": "https://www.suse.com/security/cve/CVE-2026-4438/"
}
],
"title": "Security update for glibc",
"tracking": {
"current_release_date": "2026-04-10T06:44:31Z",
"generator": {
"date": "2026-04-10T06:44:31Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:21019-1",
"initial_release_date": "2026-04-10T06:44:31Z",
"revision_history": [
{
"date": "2026-04-10T06:44:31Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "glibc-2.40-160000.4.1.aarch64",
"product": {
"name": "glibc-2.40-160000.4.1.aarch64",
"product_id": "glibc-2.40-160000.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "glibc-devel-2.40-160000.4.1.aarch64",
"product": {
"name": "glibc-devel-2.40-160000.4.1.aarch64",
"product_id": "glibc-devel-2.40-160000.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "glibc-gconv-modules-extra-2.40-160000.4.1.aarch64",
"product": {
"name": "glibc-gconv-modules-extra-2.40-160000.4.1.aarch64",
"product_id": "glibc-gconv-modules-extra-2.40-160000.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "glibc-locale-2.40-160000.4.1.aarch64",
"product": {
"name": "glibc-locale-2.40-160000.4.1.aarch64",
"product_id": "glibc-locale-2.40-160000.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "glibc-locale-base-2.40-160000.4.1.aarch64",
"product": {
"name": "glibc-locale-base-2.40-160000.4.1.aarch64",
"product_id": "glibc-locale-base-2.40-160000.4.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "glibc-2.40-160000.4.1.ppc64le",
"product": {
"name": "glibc-2.40-160000.4.1.ppc64le",
"product_id": "glibc-2.40-160000.4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "glibc-devel-2.40-160000.4.1.ppc64le",
"product": {
"name": "glibc-devel-2.40-160000.4.1.ppc64le",
"product_id": "glibc-devel-2.40-160000.4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "glibc-locale-2.40-160000.4.1.ppc64le",
"product": {
"name": "glibc-locale-2.40-160000.4.1.ppc64le",
"product_id": "glibc-locale-2.40-160000.4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "glibc-locale-base-2.40-160000.4.1.ppc64le",
"product": {
"name": "glibc-locale-base-2.40-160000.4.1.ppc64le",
"product_id": "glibc-locale-base-2.40-160000.4.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "glibc-2.40-160000.4.1.s390x",
"product": {
"name": "glibc-2.40-160000.4.1.s390x",
"product_id": "glibc-2.40-160000.4.1.s390x"
}
},
{
"category": "product_version",
"name": "glibc-devel-2.40-160000.4.1.s390x",
"product": {
"name": "glibc-devel-2.40-160000.4.1.s390x",
"product_id": "glibc-devel-2.40-160000.4.1.s390x"
}
},
{
"category": "product_version",
"name": "glibc-locale-2.40-160000.4.1.s390x",
"product": {
"name": "glibc-locale-2.40-160000.4.1.s390x",
"product_id": "glibc-locale-2.40-160000.4.1.s390x"
}
},
{
"category": "product_version",
"name": "glibc-locale-base-2.40-160000.4.1.s390x",
"product": {
"name": "glibc-locale-base-2.40-160000.4.1.s390x",
"product_id": "glibc-locale-base-2.40-160000.4.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "glibc-2.40-160000.4.1.x86_64",
"product": {
"name": "glibc-2.40-160000.4.1.x86_64",
"product_id": "glibc-2.40-160000.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "glibc-devel-2.40-160000.4.1.x86_64",
"product": {
"name": "glibc-devel-2.40-160000.4.1.x86_64",
"product_id": "glibc-devel-2.40-160000.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "glibc-gconv-modules-extra-2.40-160000.4.1.x86_64",
"product": {
"name": "glibc-gconv-modules-extra-2.40-160000.4.1.x86_64",
"product_id": "glibc-gconv-modules-extra-2.40-160000.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "glibc-locale-2.40-160000.4.1.x86_64",
"product": {
"name": "glibc-locale-2.40-160000.4.1.x86_64",
"product_id": "glibc-locale-2.40-160000.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "glibc-locale-base-2.40-160000.4.1.x86_64",
"product": {
"name": "glibc-locale-base-2.40-160000.4.1.x86_64",
"product_id": "glibc-locale-base-2.40-160000.4.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Micro 6.2",
"product": {
"name": "SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sl-micro:6.2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-2.40-160000.4.1.aarch64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:glibc-2.40-160000.4.1.aarch64"
},
"product_reference": "glibc-2.40-160000.4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-2.40-160000.4.1.ppc64le as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:glibc-2.40-160000.4.1.ppc64le"
},
"product_reference": "glibc-2.40-160000.4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-2.40-160000.4.1.s390x as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:glibc-2.40-160000.4.1.s390x"
},
"product_reference": "glibc-2.40-160000.4.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-2.40-160000.4.1.x86_64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:glibc-2.40-160000.4.1.x86_64"
},
"product_reference": "glibc-2.40-160000.4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-2.40-160000.4.1.aarch64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:glibc-devel-2.40-160000.4.1.aarch64"
},
"product_reference": "glibc-devel-2.40-160000.4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-2.40-160000.4.1.ppc64le as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:glibc-devel-2.40-160000.4.1.ppc64le"
},
"product_reference": "glibc-devel-2.40-160000.4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-2.40-160000.4.1.s390x as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:glibc-devel-2.40-160000.4.1.s390x"
},
"product_reference": "glibc-devel-2.40-160000.4.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-2.40-160000.4.1.x86_64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:glibc-devel-2.40-160000.4.1.x86_64"
},
"product_reference": "glibc-devel-2.40-160000.4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-gconv-modules-extra-2.40-160000.4.1.aarch64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:glibc-gconv-modules-extra-2.40-160000.4.1.aarch64"
},
"product_reference": "glibc-gconv-modules-extra-2.40-160000.4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-gconv-modules-extra-2.40-160000.4.1.x86_64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:glibc-gconv-modules-extra-2.40-160000.4.1.x86_64"
},
"product_reference": "glibc-gconv-modules-extra-2.40-160000.4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-2.40-160000.4.1.aarch64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:glibc-locale-2.40-160000.4.1.aarch64"
},
"product_reference": "glibc-locale-2.40-160000.4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-2.40-160000.4.1.ppc64le as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:glibc-locale-2.40-160000.4.1.ppc64le"
},
"product_reference": "glibc-locale-2.40-160000.4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-2.40-160000.4.1.s390x as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:glibc-locale-2.40-160000.4.1.s390x"
},
"product_reference": "glibc-locale-2.40-160000.4.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-2.40-160000.4.1.x86_64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:glibc-locale-2.40-160000.4.1.x86_64"
},
"product_reference": "glibc-locale-2.40-160000.4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-base-2.40-160000.4.1.aarch64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:glibc-locale-base-2.40-160000.4.1.aarch64"
},
"product_reference": "glibc-locale-base-2.40-160000.4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-base-2.40-160000.4.1.ppc64le as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:glibc-locale-base-2.40-160000.4.1.ppc64le"
},
"product_reference": "glibc-locale-base-2.40-160000.4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-base-2.40-160000.4.1.s390x as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:glibc-locale-base-2.40-160000.4.1.s390x"
},
"product_reference": "glibc-locale-base-2.40-160000.4.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-base-2.40-160000.4.1.x86_64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:glibc-locale-base-2.40-160000.4.1.x86_64"
},
"product_reference": "glibc-locale-base-2.40-160000.4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-4437",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-4437"
}
],
"notes": [
{
"category": "general",
"text": "Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library\u0027s DNS backend in the GNU C Library version 2.34 to version 2.43 could, with a crafted response from the configured DNS server, result in a violation of the DNS specification that causes the application to treat a non-answer section of the DNS response as a valid answer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:glibc-2.40-160000.4.1.aarch64",
"SUSE Linux Micro 6.2:glibc-2.40-160000.4.1.ppc64le",
"SUSE Linux Micro 6.2:glibc-2.40-160000.4.1.s390x",
"SUSE Linux Micro 6.2:glibc-2.40-160000.4.1.x86_64",
"SUSE Linux Micro 6.2:glibc-devel-2.40-160000.4.1.aarch64",
"SUSE Linux Micro 6.2:glibc-devel-2.40-160000.4.1.ppc64le",
"SUSE Linux Micro 6.2:glibc-devel-2.40-160000.4.1.s390x",
"SUSE Linux Micro 6.2:glibc-devel-2.40-160000.4.1.x86_64",
"SUSE Linux Micro 6.2:glibc-gconv-modules-extra-2.40-160000.4.1.aarch64",
"SUSE Linux Micro 6.2:glibc-gconv-modules-extra-2.40-160000.4.1.x86_64",
"SUSE Linux Micro 6.2:glibc-locale-2.40-160000.4.1.aarch64",
"SUSE Linux Micro 6.2:glibc-locale-2.40-160000.4.1.ppc64le",
"SUSE Linux Micro 6.2:glibc-locale-2.40-160000.4.1.s390x",
"SUSE Linux Micro 6.2:glibc-locale-2.40-160000.4.1.x86_64",
"SUSE Linux Micro 6.2:glibc-locale-base-2.40-160000.4.1.aarch64",
"SUSE Linux Micro 6.2:glibc-locale-base-2.40-160000.4.1.ppc64le",
"SUSE Linux Micro 6.2:glibc-locale-base-2.40-160000.4.1.s390x",
"SUSE Linux Micro 6.2:glibc-locale-base-2.40-160000.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-4437",
"url": "https://www.suse.com/security/cve/CVE-2026-4437"
},
{
"category": "external",
"summary": "SUSE Bug 1260078 for CVE-2026-4437",
"url": "https://bugzilla.suse.com/1260078"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:glibc-2.40-160000.4.1.aarch64",
"SUSE Linux Micro 6.2:glibc-2.40-160000.4.1.ppc64le",
"SUSE Linux Micro 6.2:glibc-2.40-160000.4.1.s390x",
"SUSE Linux Micro 6.2:glibc-2.40-160000.4.1.x86_64",
"SUSE Linux Micro 6.2:glibc-devel-2.40-160000.4.1.aarch64",
"SUSE Linux Micro 6.2:glibc-devel-2.40-160000.4.1.ppc64le",
"SUSE Linux Micro 6.2:glibc-devel-2.40-160000.4.1.s390x",
"SUSE Linux Micro 6.2:glibc-devel-2.40-160000.4.1.x86_64",
"SUSE Linux Micro 6.2:glibc-gconv-modules-extra-2.40-160000.4.1.aarch64",
"SUSE Linux Micro 6.2:glibc-gconv-modules-extra-2.40-160000.4.1.x86_64",
"SUSE Linux Micro 6.2:glibc-locale-2.40-160000.4.1.aarch64",
"SUSE Linux Micro 6.2:glibc-locale-2.40-160000.4.1.ppc64le",
"SUSE Linux Micro 6.2:glibc-locale-2.40-160000.4.1.s390x",
"SUSE Linux Micro 6.2:glibc-locale-2.40-160000.4.1.x86_64",
"SUSE Linux Micro 6.2:glibc-locale-base-2.40-160000.4.1.aarch64",
"SUSE Linux Micro 6.2:glibc-locale-base-2.40-160000.4.1.ppc64le",
"SUSE Linux Micro 6.2:glibc-locale-base-2.40-160000.4.1.s390x",
"SUSE Linux Micro 6.2:glibc-locale-base-2.40-160000.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:glibc-2.40-160000.4.1.aarch64",
"SUSE Linux Micro 6.2:glibc-2.40-160000.4.1.ppc64le",
"SUSE Linux Micro 6.2:glibc-2.40-160000.4.1.s390x",
"SUSE Linux Micro 6.2:glibc-2.40-160000.4.1.x86_64",
"SUSE Linux Micro 6.2:glibc-devel-2.40-160000.4.1.aarch64",
"SUSE Linux Micro 6.2:glibc-devel-2.40-160000.4.1.ppc64le",
"SUSE Linux Micro 6.2:glibc-devel-2.40-160000.4.1.s390x",
"SUSE Linux Micro 6.2:glibc-devel-2.40-160000.4.1.x86_64",
"SUSE Linux Micro 6.2:glibc-gconv-modules-extra-2.40-160000.4.1.aarch64",
"SUSE Linux Micro 6.2:glibc-gconv-modules-extra-2.40-160000.4.1.x86_64",
"SUSE Linux Micro 6.2:glibc-locale-2.40-160000.4.1.aarch64",
"SUSE Linux Micro 6.2:glibc-locale-2.40-160000.4.1.ppc64le",
"SUSE Linux Micro 6.2:glibc-locale-2.40-160000.4.1.s390x",
"SUSE Linux Micro 6.2:glibc-locale-2.40-160000.4.1.x86_64",
"SUSE Linux Micro 6.2:glibc-locale-base-2.40-160000.4.1.aarch64",
"SUSE Linux Micro 6.2:glibc-locale-base-2.40-160000.4.1.ppc64le",
"SUSE Linux Micro 6.2:glibc-locale-base-2.40-160000.4.1.s390x",
"SUSE Linux Micro 6.2:glibc-locale-base-2.40-160000.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-10T06:44:31Z",
"details": "moderate"
}
],
"title": "CVE-2026-4437"
},
{
"cve": "CVE-2026-4438",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-4438"
}
],
"notes": [
{
"category": "general",
"text": "Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library\u0027s DNS backend in the GNU C library version 2.34 to version 2.43 could result in an invalid DNS hostname being returned to the caller in violation of the DNS specification.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:glibc-2.40-160000.4.1.aarch64",
"SUSE Linux Micro 6.2:glibc-2.40-160000.4.1.ppc64le",
"SUSE Linux Micro 6.2:glibc-2.40-160000.4.1.s390x",
"SUSE Linux Micro 6.2:glibc-2.40-160000.4.1.x86_64",
"SUSE Linux Micro 6.2:glibc-devel-2.40-160000.4.1.aarch64",
"SUSE Linux Micro 6.2:glibc-devel-2.40-160000.4.1.ppc64le",
"SUSE Linux Micro 6.2:glibc-devel-2.40-160000.4.1.s390x",
"SUSE Linux Micro 6.2:glibc-devel-2.40-160000.4.1.x86_64",
"SUSE Linux Micro 6.2:glibc-gconv-modules-extra-2.40-160000.4.1.aarch64",
"SUSE Linux Micro 6.2:glibc-gconv-modules-extra-2.40-160000.4.1.x86_64",
"SUSE Linux Micro 6.2:glibc-locale-2.40-160000.4.1.aarch64",
"SUSE Linux Micro 6.2:glibc-locale-2.40-160000.4.1.ppc64le",
"SUSE Linux Micro 6.2:glibc-locale-2.40-160000.4.1.s390x",
"SUSE Linux Micro 6.2:glibc-locale-2.40-160000.4.1.x86_64",
"SUSE Linux Micro 6.2:glibc-locale-base-2.40-160000.4.1.aarch64",
"SUSE Linux Micro 6.2:glibc-locale-base-2.40-160000.4.1.ppc64le",
"SUSE Linux Micro 6.2:glibc-locale-base-2.40-160000.4.1.s390x",
"SUSE Linux Micro 6.2:glibc-locale-base-2.40-160000.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-4438",
"url": "https://www.suse.com/security/cve/CVE-2026-4438"
},
{
"category": "external",
"summary": "SUSE Bug 1260082 for CVE-2026-4438",
"url": "https://bugzilla.suse.com/1260082"
},
{
"category": "external",
"summary": "SUSE Bug 1260333 for CVE-2026-4438",
"url": "https://bugzilla.suse.com/1260333"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:glibc-2.40-160000.4.1.aarch64",
"SUSE Linux Micro 6.2:glibc-2.40-160000.4.1.ppc64le",
"SUSE Linux Micro 6.2:glibc-2.40-160000.4.1.s390x",
"SUSE Linux Micro 6.2:glibc-2.40-160000.4.1.x86_64",
"SUSE Linux Micro 6.2:glibc-devel-2.40-160000.4.1.aarch64",
"SUSE Linux Micro 6.2:glibc-devel-2.40-160000.4.1.ppc64le",
"SUSE Linux Micro 6.2:glibc-devel-2.40-160000.4.1.s390x",
"SUSE Linux Micro 6.2:glibc-devel-2.40-160000.4.1.x86_64",
"SUSE Linux Micro 6.2:glibc-gconv-modules-extra-2.40-160000.4.1.aarch64",
"SUSE Linux Micro 6.2:glibc-gconv-modules-extra-2.40-160000.4.1.x86_64",
"SUSE Linux Micro 6.2:glibc-locale-2.40-160000.4.1.aarch64",
"SUSE Linux Micro 6.2:glibc-locale-2.40-160000.4.1.ppc64le",
"SUSE Linux Micro 6.2:glibc-locale-2.40-160000.4.1.s390x",
"SUSE Linux Micro 6.2:glibc-locale-2.40-160000.4.1.x86_64",
"SUSE Linux Micro 6.2:glibc-locale-base-2.40-160000.4.1.aarch64",
"SUSE Linux Micro 6.2:glibc-locale-base-2.40-160000.4.1.ppc64le",
"SUSE Linux Micro 6.2:glibc-locale-base-2.40-160000.4.1.s390x",
"SUSE Linux Micro 6.2:glibc-locale-base-2.40-160000.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:glibc-2.40-160000.4.1.aarch64",
"SUSE Linux Micro 6.2:glibc-2.40-160000.4.1.ppc64le",
"SUSE Linux Micro 6.2:glibc-2.40-160000.4.1.s390x",
"SUSE Linux Micro 6.2:glibc-2.40-160000.4.1.x86_64",
"SUSE Linux Micro 6.2:glibc-devel-2.40-160000.4.1.aarch64",
"SUSE Linux Micro 6.2:glibc-devel-2.40-160000.4.1.ppc64le",
"SUSE Linux Micro 6.2:glibc-devel-2.40-160000.4.1.s390x",
"SUSE Linux Micro 6.2:glibc-devel-2.40-160000.4.1.x86_64",
"SUSE Linux Micro 6.2:glibc-gconv-modules-extra-2.40-160000.4.1.aarch64",
"SUSE Linux Micro 6.2:glibc-gconv-modules-extra-2.40-160000.4.1.x86_64",
"SUSE Linux Micro 6.2:glibc-locale-2.40-160000.4.1.aarch64",
"SUSE Linux Micro 6.2:glibc-locale-2.40-160000.4.1.ppc64le",
"SUSE Linux Micro 6.2:glibc-locale-2.40-160000.4.1.s390x",
"SUSE Linux Micro 6.2:glibc-locale-2.40-160000.4.1.x86_64",
"SUSE Linux Micro 6.2:glibc-locale-base-2.40-160000.4.1.aarch64",
"SUSE Linux Micro 6.2:glibc-locale-base-2.40-160000.4.1.ppc64le",
"SUSE Linux Micro 6.2:glibc-locale-base-2.40-160000.4.1.s390x",
"SUSE Linux Micro 6.2:glibc-locale-base-2.40-160000.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-10T06:44:31Z",
"details": "moderate"
}
],
"title": "CVE-2026-4438"
}
]
}
SUSE-SU-2026:21039-1
Vulnerability from csaf_suse - Published: 2026-04-09 12:13 - Updated: 2026-04-09 12:13Summary
Security update for glibc
Severity
Important
Notes
Title of the patch: Security update for glibc
Description of the patch: This update for glibc fixes the following issues:
- CVE-2026-4437: incorrect DNS response parsing via crafted DNS server response (bsc#1260078).
- CVE-2026-4438: invalid DNS hostname returned via gethostbyaddr functions (bsc#1260082).
Patchnames: SUSE-SLE-Micro-6.1-478
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
4.7 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.7 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
| URL | Category | ||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for glibc",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for glibc fixes the following issues:\n\n- CVE-2026-4437: incorrect DNS response parsing via crafted DNS server response (bsc#1260078).\n- CVE-2026-4438: invalid DNS hostname returned via gethostbyaddr functions (bsc#1260082).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Micro-6.1-478",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_21039-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:21039-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202621039-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:21039-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-April/025301.html"
},
{
"category": "self",
"summary": "SUSE Bug 1260078",
"url": "https://bugzilla.suse.com/1260078"
},
{
"category": "self",
"summary": "SUSE Bug 1260082",
"url": "https://bugzilla.suse.com/1260082"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-4437 page",
"url": "https://www.suse.com/security/cve/CVE-2026-4437/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-4438 page",
"url": "https://www.suse.com/security/cve/CVE-2026-4438/"
}
],
"title": "Security update for glibc",
"tracking": {
"current_release_date": "2026-04-09T12:13:01Z",
"generator": {
"date": "2026-04-09T12:13:01Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:21039-1",
"initial_release_date": "2026-04-09T12:13:01Z",
"revision_history": [
{
"date": "2026-04-09T12:13:01Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "glibc-2.38-slfo.1.1_7.1.aarch64",
"product": {
"name": "glibc-2.38-slfo.1.1_7.1.aarch64",
"product_id": "glibc-2.38-slfo.1.1_7.1.aarch64"
}
},
{
"category": "product_version",
"name": "glibc-devel-2.38-slfo.1.1_7.1.aarch64",
"product": {
"name": "glibc-devel-2.38-slfo.1.1_7.1.aarch64",
"product_id": "glibc-devel-2.38-slfo.1.1_7.1.aarch64"
}
},
{
"category": "product_version",
"name": "glibc-locale-2.38-slfo.1.1_7.1.aarch64",
"product": {
"name": "glibc-locale-2.38-slfo.1.1_7.1.aarch64",
"product_id": "glibc-locale-2.38-slfo.1.1_7.1.aarch64"
}
},
{
"category": "product_version",
"name": "glibc-locale-base-2.38-slfo.1.1_7.1.aarch64",
"product": {
"name": "glibc-locale-base-2.38-slfo.1.1_7.1.aarch64",
"product_id": "glibc-locale-base-2.38-slfo.1.1_7.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "glibc-2.38-slfo.1.1_7.1.ppc64le",
"product": {
"name": "glibc-2.38-slfo.1.1_7.1.ppc64le",
"product_id": "glibc-2.38-slfo.1.1_7.1.ppc64le"
}
},
{
"category": "product_version",
"name": "glibc-devel-2.38-slfo.1.1_7.1.ppc64le",
"product": {
"name": "glibc-devel-2.38-slfo.1.1_7.1.ppc64le",
"product_id": "glibc-devel-2.38-slfo.1.1_7.1.ppc64le"
}
},
{
"category": "product_version",
"name": "glibc-locale-2.38-slfo.1.1_7.1.ppc64le",
"product": {
"name": "glibc-locale-2.38-slfo.1.1_7.1.ppc64le",
"product_id": "glibc-locale-2.38-slfo.1.1_7.1.ppc64le"
}
},
{
"category": "product_version",
"name": "glibc-locale-base-2.38-slfo.1.1_7.1.ppc64le",
"product": {
"name": "glibc-locale-base-2.38-slfo.1.1_7.1.ppc64le",
"product_id": "glibc-locale-base-2.38-slfo.1.1_7.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "glibc-2.38-slfo.1.1_7.1.s390x",
"product": {
"name": "glibc-2.38-slfo.1.1_7.1.s390x",
"product_id": "glibc-2.38-slfo.1.1_7.1.s390x"
}
},
{
"category": "product_version",
"name": "glibc-devel-2.38-slfo.1.1_7.1.s390x",
"product": {
"name": "glibc-devel-2.38-slfo.1.1_7.1.s390x",
"product_id": "glibc-devel-2.38-slfo.1.1_7.1.s390x"
}
},
{
"category": "product_version",
"name": "glibc-locale-2.38-slfo.1.1_7.1.s390x",
"product": {
"name": "glibc-locale-2.38-slfo.1.1_7.1.s390x",
"product_id": "glibc-locale-2.38-slfo.1.1_7.1.s390x"
}
},
{
"category": "product_version",
"name": "glibc-locale-base-2.38-slfo.1.1_7.1.s390x",
"product": {
"name": "glibc-locale-base-2.38-slfo.1.1_7.1.s390x",
"product_id": "glibc-locale-base-2.38-slfo.1.1_7.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "glibc-2.38-slfo.1.1_7.1.x86_64",
"product": {
"name": "glibc-2.38-slfo.1.1_7.1.x86_64",
"product_id": "glibc-2.38-slfo.1.1_7.1.x86_64"
}
},
{
"category": "product_version",
"name": "glibc-devel-2.38-slfo.1.1_7.1.x86_64",
"product": {
"name": "glibc-devel-2.38-slfo.1.1_7.1.x86_64",
"product_id": "glibc-devel-2.38-slfo.1.1_7.1.x86_64"
}
},
{
"category": "product_version",
"name": "glibc-locale-2.38-slfo.1.1_7.1.x86_64",
"product": {
"name": "glibc-locale-2.38-slfo.1.1_7.1.x86_64",
"product_id": "glibc-locale-2.38-slfo.1.1_7.1.x86_64"
}
},
{
"category": "product_version",
"name": "glibc-locale-base-2.38-slfo.1.1_7.1.x86_64",
"product": {
"name": "glibc-locale-base-2.38-slfo.1.1_7.1.x86_64",
"product_id": "glibc-locale-base-2.38-slfo.1.1_7.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Micro 6.1",
"product": {
"name": "SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sl-micro:6.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-2.38-slfo.1.1_7.1.aarch64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:glibc-2.38-slfo.1.1_7.1.aarch64"
},
"product_reference": "glibc-2.38-slfo.1.1_7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-2.38-slfo.1.1_7.1.ppc64le as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:glibc-2.38-slfo.1.1_7.1.ppc64le"
},
"product_reference": "glibc-2.38-slfo.1.1_7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-2.38-slfo.1.1_7.1.s390x as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:glibc-2.38-slfo.1.1_7.1.s390x"
},
"product_reference": "glibc-2.38-slfo.1.1_7.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-2.38-slfo.1.1_7.1.x86_64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:glibc-2.38-slfo.1.1_7.1.x86_64"
},
"product_reference": "glibc-2.38-slfo.1.1_7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-2.38-slfo.1.1_7.1.aarch64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:glibc-devel-2.38-slfo.1.1_7.1.aarch64"
},
"product_reference": "glibc-devel-2.38-slfo.1.1_7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-2.38-slfo.1.1_7.1.ppc64le as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:glibc-devel-2.38-slfo.1.1_7.1.ppc64le"
},
"product_reference": "glibc-devel-2.38-slfo.1.1_7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-2.38-slfo.1.1_7.1.s390x as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:glibc-devel-2.38-slfo.1.1_7.1.s390x"
},
"product_reference": "glibc-devel-2.38-slfo.1.1_7.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-2.38-slfo.1.1_7.1.x86_64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:glibc-devel-2.38-slfo.1.1_7.1.x86_64"
},
"product_reference": "glibc-devel-2.38-slfo.1.1_7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-2.38-slfo.1.1_7.1.aarch64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:glibc-locale-2.38-slfo.1.1_7.1.aarch64"
},
"product_reference": "glibc-locale-2.38-slfo.1.1_7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-2.38-slfo.1.1_7.1.ppc64le as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:glibc-locale-2.38-slfo.1.1_7.1.ppc64le"
},
"product_reference": "glibc-locale-2.38-slfo.1.1_7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-2.38-slfo.1.1_7.1.s390x as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:glibc-locale-2.38-slfo.1.1_7.1.s390x"
},
"product_reference": "glibc-locale-2.38-slfo.1.1_7.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-2.38-slfo.1.1_7.1.x86_64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:glibc-locale-2.38-slfo.1.1_7.1.x86_64"
},
"product_reference": "glibc-locale-2.38-slfo.1.1_7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-base-2.38-slfo.1.1_7.1.aarch64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:glibc-locale-base-2.38-slfo.1.1_7.1.aarch64"
},
"product_reference": "glibc-locale-base-2.38-slfo.1.1_7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-base-2.38-slfo.1.1_7.1.ppc64le as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:glibc-locale-base-2.38-slfo.1.1_7.1.ppc64le"
},
"product_reference": "glibc-locale-base-2.38-slfo.1.1_7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-base-2.38-slfo.1.1_7.1.s390x as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:glibc-locale-base-2.38-slfo.1.1_7.1.s390x"
},
"product_reference": "glibc-locale-base-2.38-slfo.1.1_7.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-base-2.38-slfo.1.1_7.1.x86_64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:glibc-locale-base-2.38-slfo.1.1_7.1.x86_64"
},
"product_reference": "glibc-locale-base-2.38-slfo.1.1_7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-4437",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-4437"
}
],
"notes": [
{
"category": "general",
"text": "Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library\u0027s DNS backend in the GNU C Library version 2.34 to version 2.43 could, with a crafted response from the configured DNS server, result in a violation of the DNS specification that causes the application to treat a non-answer section of the DNS response as a valid answer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:glibc-2.38-slfo.1.1_7.1.aarch64",
"SUSE Linux Micro 6.1:glibc-2.38-slfo.1.1_7.1.ppc64le",
"SUSE Linux Micro 6.1:glibc-2.38-slfo.1.1_7.1.s390x",
"SUSE Linux Micro 6.1:glibc-2.38-slfo.1.1_7.1.x86_64",
"SUSE Linux Micro 6.1:glibc-devel-2.38-slfo.1.1_7.1.aarch64",
"SUSE Linux Micro 6.1:glibc-devel-2.38-slfo.1.1_7.1.ppc64le",
"SUSE Linux Micro 6.1:glibc-devel-2.38-slfo.1.1_7.1.s390x",
"SUSE Linux Micro 6.1:glibc-devel-2.38-slfo.1.1_7.1.x86_64",
"SUSE Linux Micro 6.1:glibc-locale-2.38-slfo.1.1_7.1.aarch64",
"SUSE Linux Micro 6.1:glibc-locale-2.38-slfo.1.1_7.1.ppc64le",
"SUSE Linux Micro 6.1:glibc-locale-2.38-slfo.1.1_7.1.s390x",
"SUSE Linux Micro 6.1:glibc-locale-2.38-slfo.1.1_7.1.x86_64",
"SUSE Linux Micro 6.1:glibc-locale-base-2.38-slfo.1.1_7.1.aarch64",
"SUSE Linux Micro 6.1:glibc-locale-base-2.38-slfo.1.1_7.1.ppc64le",
"SUSE Linux Micro 6.1:glibc-locale-base-2.38-slfo.1.1_7.1.s390x",
"SUSE Linux Micro 6.1:glibc-locale-base-2.38-slfo.1.1_7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-4437",
"url": "https://www.suse.com/security/cve/CVE-2026-4437"
},
{
"category": "external",
"summary": "SUSE Bug 1260078 for CVE-2026-4437",
"url": "https://bugzilla.suse.com/1260078"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:glibc-2.38-slfo.1.1_7.1.aarch64",
"SUSE Linux Micro 6.1:glibc-2.38-slfo.1.1_7.1.ppc64le",
"SUSE Linux Micro 6.1:glibc-2.38-slfo.1.1_7.1.s390x",
"SUSE Linux Micro 6.1:glibc-2.38-slfo.1.1_7.1.x86_64",
"SUSE Linux Micro 6.1:glibc-devel-2.38-slfo.1.1_7.1.aarch64",
"SUSE Linux Micro 6.1:glibc-devel-2.38-slfo.1.1_7.1.ppc64le",
"SUSE Linux Micro 6.1:glibc-devel-2.38-slfo.1.1_7.1.s390x",
"SUSE Linux Micro 6.1:glibc-devel-2.38-slfo.1.1_7.1.x86_64",
"SUSE Linux Micro 6.1:glibc-locale-2.38-slfo.1.1_7.1.aarch64",
"SUSE Linux Micro 6.1:glibc-locale-2.38-slfo.1.1_7.1.ppc64le",
"SUSE Linux Micro 6.1:glibc-locale-2.38-slfo.1.1_7.1.s390x",
"SUSE Linux Micro 6.1:glibc-locale-2.38-slfo.1.1_7.1.x86_64",
"SUSE Linux Micro 6.1:glibc-locale-base-2.38-slfo.1.1_7.1.aarch64",
"SUSE Linux Micro 6.1:glibc-locale-base-2.38-slfo.1.1_7.1.ppc64le",
"SUSE Linux Micro 6.1:glibc-locale-base-2.38-slfo.1.1_7.1.s390x",
"SUSE Linux Micro 6.1:glibc-locale-base-2.38-slfo.1.1_7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:glibc-2.38-slfo.1.1_7.1.aarch64",
"SUSE Linux Micro 6.1:glibc-2.38-slfo.1.1_7.1.ppc64le",
"SUSE Linux Micro 6.1:glibc-2.38-slfo.1.1_7.1.s390x",
"SUSE Linux Micro 6.1:glibc-2.38-slfo.1.1_7.1.x86_64",
"SUSE Linux Micro 6.1:glibc-devel-2.38-slfo.1.1_7.1.aarch64",
"SUSE Linux Micro 6.1:glibc-devel-2.38-slfo.1.1_7.1.ppc64le",
"SUSE Linux Micro 6.1:glibc-devel-2.38-slfo.1.1_7.1.s390x",
"SUSE Linux Micro 6.1:glibc-devel-2.38-slfo.1.1_7.1.x86_64",
"SUSE Linux Micro 6.1:glibc-locale-2.38-slfo.1.1_7.1.aarch64",
"SUSE Linux Micro 6.1:glibc-locale-2.38-slfo.1.1_7.1.ppc64le",
"SUSE Linux Micro 6.1:glibc-locale-2.38-slfo.1.1_7.1.s390x",
"SUSE Linux Micro 6.1:glibc-locale-2.38-slfo.1.1_7.1.x86_64",
"SUSE Linux Micro 6.1:glibc-locale-base-2.38-slfo.1.1_7.1.aarch64",
"SUSE Linux Micro 6.1:glibc-locale-base-2.38-slfo.1.1_7.1.ppc64le",
"SUSE Linux Micro 6.1:glibc-locale-base-2.38-slfo.1.1_7.1.s390x",
"SUSE Linux Micro 6.1:glibc-locale-base-2.38-slfo.1.1_7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-09T12:13:01Z",
"details": "moderate"
}
],
"title": "CVE-2026-4437"
},
{
"cve": "CVE-2026-4438",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-4438"
}
],
"notes": [
{
"category": "general",
"text": "Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library\u0027s DNS backend in the GNU C library version 2.34 to version 2.43 could result in an invalid DNS hostname being returned to the caller in violation of the DNS specification.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:glibc-2.38-slfo.1.1_7.1.aarch64",
"SUSE Linux Micro 6.1:glibc-2.38-slfo.1.1_7.1.ppc64le",
"SUSE Linux Micro 6.1:glibc-2.38-slfo.1.1_7.1.s390x",
"SUSE Linux Micro 6.1:glibc-2.38-slfo.1.1_7.1.x86_64",
"SUSE Linux Micro 6.1:glibc-devel-2.38-slfo.1.1_7.1.aarch64",
"SUSE Linux Micro 6.1:glibc-devel-2.38-slfo.1.1_7.1.ppc64le",
"SUSE Linux Micro 6.1:glibc-devel-2.38-slfo.1.1_7.1.s390x",
"SUSE Linux Micro 6.1:glibc-devel-2.38-slfo.1.1_7.1.x86_64",
"SUSE Linux Micro 6.1:glibc-locale-2.38-slfo.1.1_7.1.aarch64",
"SUSE Linux Micro 6.1:glibc-locale-2.38-slfo.1.1_7.1.ppc64le",
"SUSE Linux Micro 6.1:glibc-locale-2.38-slfo.1.1_7.1.s390x",
"SUSE Linux Micro 6.1:glibc-locale-2.38-slfo.1.1_7.1.x86_64",
"SUSE Linux Micro 6.1:glibc-locale-base-2.38-slfo.1.1_7.1.aarch64",
"SUSE Linux Micro 6.1:glibc-locale-base-2.38-slfo.1.1_7.1.ppc64le",
"SUSE Linux Micro 6.1:glibc-locale-base-2.38-slfo.1.1_7.1.s390x",
"SUSE Linux Micro 6.1:glibc-locale-base-2.38-slfo.1.1_7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-4438",
"url": "https://www.suse.com/security/cve/CVE-2026-4438"
},
{
"category": "external",
"summary": "SUSE Bug 1260082 for CVE-2026-4438",
"url": "https://bugzilla.suse.com/1260082"
},
{
"category": "external",
"summary": "SUSE Bug 1260333 for CVE-2026-4438",
"url": "https://bugzilla.suse.com/1260333"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:glibc-2.38-slfo.1.1_7.1.aarch64",
"SUSE Linux Micro 6.1:glibc-2.38-slfo.1.1_7.1.ppc64le",
"SUSE Linux Micro 6.1:glibc-2.38-slfo.1.1_7.1.s390x",
"SUSE Linux Micro 6.1:glibc-2.38-slfo.1.1_7.1.x86_64",
"SUSE Linux Micro 6.1:glibc-devel-2.38-slfo.1.1_7.1.aarch64",
"SUSE Linux Micro 6.1:glibc-devel-2.38-slfo.1.1_7.1.ppc64le",
"SUSE Linux Micro 6.1:glibc-devel-2.38-slfo.1.1_7.1.s390x",
"SUSE Linux Micro 6.1:glibc-devel-2.38-slfo.1.1_7.1.x86_64",
"SUSE Linux Micro 6.1:glibc-locale-2.38-slfo.1.1_7.1.aarch64",
"SUSE Linux Micro 6.1:glibc-locale-2.38-slfo.1.1_7.1.ppc64le",
"SUSE Linux Micro 6.1:glibc-locale-2.38-slfo.1.1_7.1.s390x",
"SUSE Linux Micro 6.1:glibc-locale-2.38-slfo.1.1_7.1.x86_64",
"SUSE Linux Micro 6.1:glibc-locale-base-2.38-slfo.1.1_7.1.aarch64",
"SUSE Linux Micro 6.1:glibc-locale-base-2.38-slfo.1.1_7.1.ppc64le",
"SUSE Linux Micro 6.1:glibc-locale-base-2.38-slfo.1.1_7.1.s390x",
"SUSE Linux Micro 6.1:glibc-locale-base-2.38-slfo.1.1_7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:glibc-2.38-slfo.1.1_7.1.aarch64",
"SUSE Linux Micro 6.1:glibc-2.38-slfo.1.1_7.1.ppc64le",
"SUSE Linux Micro 6.1:glibc-2.38-slfo.1.1_7.1.s390x",
"SUSE Linux Micro 6.1:glibc-2.38-slfo.1.1_7.1.x86_64",
"SUSE Linux Micro 6.1:glibc-devel-2.38-slfo.1.1_7.1.aarch64",
"SUSE Linux Micro 6.1:glibc-devel-2.38-slfo.1.1_7.1.ppc64le",
"SUSE Linux Micro 6.1:glibc-devel-2.38-slfo.1.1_7.1.s390x",
"SUSE Linux Micro 6.1:glibc-devel-2.38-slfo.1.1_7.1.x86_64",
"SUSE Linux Micro 6.1:glibc-locale-2.38-slfo.1.1_7.1.aarch64",
"SUSE Linux Micro 6.1:glibc-locale-2.38-slfo.1.1_7.1.ppc64le",
"SUSE Linux Micro 6.1:glibc-locale-2.38-slfo.1.1_7.1.s390x",
"SUSE Linux Micro 6.1:glibc-locale-2.38-slfo.1.1_7.1.x86_64",
"SUSE Linux Micro 6.1:glibc-locale-base-2.38-slfo.1.1_7.1.aarch64",
"SUSE Linux Micro 6.1:glibc-locale-base-2.38-slfo.1.1_7.1.ppc64le",
"SUSE Linux Micro 6.1:glibc-locale-base-2.38-slfo.1.1_7.1.s390x",
"SUSE Linux Micro 6.1:glibc-locale-base-2.38-slfo.1.1_7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-09T12:13:01Z",
"details": "moderate"
}
],
"title": "CVE-2026-4438"
}
]
}
MSRC_CVE-2026-4437
Vulnerability from csaf_microsoft - Published: 2026-03-02 00:00 - Updated: 2026-03-31 15:09Summary
gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response
Notes
Additional Resources: To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle
Disclaimer: The information provided in the Microsoft Knowledge Base is provided \"as is\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
CWE-125
- Out-of-bounds Read
None Available
There is no fix available for this vulnerability as of now
Vendor Fix
2.38-19:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade
https://learn.microsoft.com/en-us/azure/azure-lin…
References
| URL | Category | |
|---|---|---|
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2026-4437 gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2026/msrc_cve-2026-4437.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response",
"tracking": {
"current_release_date": "2026-03-31T15:09:24.000Z",
"generator": {
"date": "2026-04-01T07:38:22.468Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2026-4437",
"initial_release_date": "2026-03-02T00:00:00.000Z",
"revision_history": [
{
"date": "2026-03-22T01:01:18.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2026-03-23T14:39:29.000Z",
"legacy_version": "2",
"number": "2",
"summary": "Information published."
},
{
"date": "2026-03-25T01:01:14.000Z",
"legacy_version": "3",
"number": "3",
"summary": "Information published."
},
{
"date": "2026-03-28T14:37:28.000Z",
"legacy_version": "4",
"number": "4",
"summary": "Information published."
},
{
"date": "2026-03-31T15:09:24.000Z",
"legacy_version": "5",
"number": "5",
"summary": "Information published."
}
],
"status": "final",
"version": "5"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
},
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "CBL Mariner 2.0",
"product_id": "17086"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cazl3 glibc 2.38-19",
"product": {
"name": "\u003cazl3 glibc 2.38-19",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "azl3 glibc 2.38-19",
"product": {
"name": "azl3 glibc 2.38-19",
"product_id": "21140"
}
},
{
"category": "product_version_range",
"name": "\u003cazl3 glibc 2.38-18",
"product": {
"name": "\u003cazl3 glibc 2.38-18",
"product_id": "3"
}
},
{
"category": "product_version",
"name": "azl3 glibc 2.38-18",
"product": {
"name": "azl3 glibc 2.38-18",
"product_id": "20895"
}
},
{
"category": "product_version_range",
"name": "cbl2 glibc 2.35-10",
"product": {
"name": "cbl2 glibc 2.35-10",
"product_id": "2"
}
}
],
"category": "product_name",
"name": "glibc"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 glibc 2.38-19 as a component of Azure Linux 3.0",
"product_id": "17084-1"
},
"product_reference": "1",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 glibc 2.38-19 as a component of Azure Linux 3.0",
"product_id": "21140-17084"
},
"product_reference": "21140",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 glibc 2.38-18 as a component of Azure Linux 3.0",
"product_id": "17084-3"
},
"product_reference": "3",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 glibc 2.38-18 as a component of Azure Linux 3.0",
"product_id": "20895-17084"
},
"product_reference": "20895",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 glibc 2.35-10 as a component of CBL Mariner 2.0",
"product_id": "17086-2"
},
"product_reference": "2",
"relates_to_product_reference": "17086"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-4437",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "general",
"text": "glibc",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"21140-17084",
"20895-17084"
],
"known_affected": [
"17084-1",
"17084-3",
"17086-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-4437 gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2026/msrc_cve-2026-4437.json"
}
],
"remediations": [
{
"category": "none_available",
"date": "2026-03-22T01:01:18.000Z",
"details": "There is no fix available for this vulnerability as of now",
"product_ids": [
"17086-2"
]
},
{
"category": "vendor_fix",
"date": "2026-03-22T01:01:18.000Z",
"details": "2.38-19:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-1",
"17084-3"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"title": "gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response"
}
]
}
Loading…
Show additional events:
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…