The deprecated functions ns_printrrf, ns_printrr and fp_nquery in the GNU C Library version 2.2 and newer fail to validate the RDATA content against the RDATA length in a DNS response when processing LOC, CERT, TKEY or TSIG records, which may allow an attacker to craft a DNS response, causing a target application to crash or read uninitialized memory.
These functions are for application debugging only and hence not in the path of code executed by the DNS resolver. Further, they have been deprecated since version 2.34 and should not be used by any new applications. Applications should consider porting away from these interfaces since they may be removed in future versions.
Metrics
Affected Vendors & Products
References
History
Tue, 28 Apr 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The deprecated functions ns_printrrf, ns_printrr and fp_nquery in the GNU C Library version 2.2 and newer fail to validate the RDATA content against the RDATA length in a DNS response when processing LOC, CERT, TKEY or TSIG records, which may allow an attacker to craft a DNS response, causing a target application to crash or read uninitialized memory. These functions are for application debugging only and hence not in the path of code executed by the DNS resolver. Further, they have been deprecated since version 2.34 and should not be used by any new applications. Applications should consider porting away from these interfaces since they may be removed in future versions. | |
| Title | Buffer overread in ns_printrrf with corrupted RDATA field | |
| Weaknesses | CWE-126 | |
| References |
|
Status: PUBLISHED
Assigner: glibc
Published:
Updated: 2026-04-28T16:44:36.663Z
Reserved: 2026-04-13T16:56:08.986Z
Link: CVE-2026-6238
No data.
Status : Received
Published: 2026-04-28T19:37:47.523
Modified: 2026-04-28T19:37:47.523
Link: CVE-2026-6238
No data.
OpenCVE Enrichment
No data.