The deprecated functions ns_printrrf, ns_printrr and fp_nquery in the GNU C Library version 2.2 and newer fail to validate the RDATA content against the RDATA length in a DNS response when processing LOC, CERT, TKEY or TSIG records, which may allow an attacker to craft a DNS response, causing a target application to crash or read uninitialized memory. These functions are for application debugging only and hence not in the path of code executed by the DNS resolver. Further, they have been deprecated since version 2.34 and should not be used by any new applications. Applications should consider porting away from these interfaces since they may be removed in future versions.
History

Tue, 28 Apr 2026 18:30:00 +0000

Type Values Removed Values Added
Description The deprecated functions ns_printrrf, ns_printrr and fp_nquery in the GNU C Library version 2.2 and newer fail to validate the RDATA content against the RDATA length in a DNS response when processing LOC, CERT, TKEY or TSIG records, which may allow an attacker to craft a DNS response, causing a target application to crash or read uninitialized memory. These functions are for application debugging only and hence not in the path of code executed by the DNS resolver. Further, they have been deprecated since version 2.34 and should not be used by any new applications. Applications should consider porting away from these interfaces since they may be removed in future versions.
Title Buffer overread in ns_printrrf with corrupted RDATA field
Weaknesses CWE-126
References

cve-icon MITRE

Status: PUBLISHED

Assigner: glibc

Published:

Updated: 2026-04-28T16:44:36.663Z

Reserved: 2026-04-13T16:56:08.986Z

Link: CVE-2026-6238

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-28T19:37:47.523

Modified: 2026-04-28T19:37:47.523

Link: CVE-2026-6238

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.