Buffer overread in ns_printrrf with corrupted RDATA field
Summary
| CVE | CVE-2026-6238 |
|---|---|
| State | PUBLISHED |
| Assigner | glibc |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-04-28 19:37:47 UTC |
| Updated | 2026-05-04 17:57:24 UTC |
| Description | The deprecated functions ns_printrrf, ns_printrr and fp_nquery in the GNU C Library version 2.2 and newer fail to validate the RDATA content against the RDATA length in a DNS response when processing LOC, CERT, TKEY or TSIG records, which may allow an attacker to craft a DNS response, causing a target application to crash or read uninitialized memory. These functions are for application debugging only and hence not in the path of code executed by the DNS resolver. Further, they have been deprecated since version 2.34 and should not be used by any new applications. Applications should consider porting away from these interfaces since they may be removed in future versions. |
Risk And Classification
Primary CVSS: v3.1 6.5 MEDIUM from ADP
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
EPSS: 0.000450000 probability, percentile 0.136530000 (date 2026-05-05)
Problem Types: CWE-126 | CWE-126 CWE-126 Buffer over-read
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.1 | ADP | DECLARED | 6.5 | MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L |
| 3.1 | 134c704f-9b21-4f2e-91b3-4a467353bcc0 | Secondary | 6.5 | MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L |
CVSS v3.1 Breakdown
Attack Vector
NetworkAttack Complexity
LowPrivileges Required
NoneUser Interaction
NoneScope
UnchangedConfidentiality
LowIntegrity
NoneAvailability
LowCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
NVD Known Affected Configurations (CPE 2.3)
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | The GNU C Library | Glibc | affected 2.2 custom | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| sourceware.org/bugzilla/show_bug.cgi | 3ff69d7a-14f2-4f67-a097-88dee7810d18 | sourceware.org | Issue Tracking |
| inbox.sourceware.org/libc-announce/[email protected]/T | 3ff69d7a-14f2-4f67-a097-88dee7810d18 | inbox.sourceware.org | Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.