Changeflow GovPing Data Privacy & Cybersecurity GNU libc Denial of Service Vulnerability
Priority review Guidance Added Final

GNU libc Denial of Service Vulnerability

Favicon for wid.cert-bund.de CERT-Bund Security Advisories
Published March 30th, 2026
Detected March 31st, 2026
Email

Summary

CERT-Bund issued advisory WID-SEC-2026-0918 warning of a denial of service vulnerability in GNU libc versions up to 2.43 (CVSS 7.5). The vulnerability allows remote anonymous attackers to cause service disruption. Mitigation measures are available.

What changed

The vulnerability affects GNU libc, a core C library used in Linux and other UNIX systems, with versions up to and including 2.43 vulnerable. Remote attackers can exploit this to perform denial of service attacks. Organizations using affected versions should immediately identify vulnerable systems, apply available patches or mitigations, and monitor for exploitation attempts.

Organizations should audit their systems to determine if GNU libc versions 2.43 or earlier are present, apply vendor-released patches or workarounds, and implement intrusion detection monitoring to identify potential exploitation attempts.

What to do next

  1. Identify systems running GNU libc <=2.43
  2. Apply patches or mitigations
  3. Monitor for exploitation attempts

Source document (simplified)

[WID-SEC-2026-0918] GNU libc: Schwachstelle ermöglicht Denial of Service CVSS Base Score 7.5 (hoch) CVSS Temporal Score 6.7 (mittel) Remoteangriff ja Datum 30.03.2026 Stand 31.03.2026 Mitigation ja

Betroffene Systeme

Betriebssystem

  • UNIX

Produktbeschreibung

Die GNU libc ist die Basis C Bibliothek unter Linux sowie anderen Unix-Betriebssystemen, welche die Systemaufrufe sowie Basisfunktionalität bereitstellt.

Produkte

30.03.2026
- Open Source GNU libc <=2.43

Angriff

Angriff

Ein entfernter, anonymer Angreifer kann eine Schwachstelle in GNU libc ausnutzen, um einen Denial of Service Angriff durchzuführen. CVE Informationen Versionshistorie Feedback zum Advisory geben

Source

Analysis generated by AI. Source diff and links are from the original.

Classification

Agency
CERT-Bund
Published
March 30th, 2026
Instrument
Guidance
Legal weight
Non-binding
Stage
Final
Change scope
Substantive
Document ID
WID-SEC-2026-0918

Who this affects

Applies to
Technology companies Government agencies Manufacturers
Industry sector
5112 Software & Technology
Activity scope
Vulnerability Management
Geographic scope
Germany DE

Taxonomy

Primary area
Cybersecurity
Operational domain
IT Security
Compliance frameworks
NIST CSF
Topics
Data Privacy Defense & National Security

Get Data Privacy & Cybersecurity alerts

Weekly digest. AI-summarized, no noise.

Free. Unsubscribe anytime.

Get alerts for this source

We'll email you when CERT-Bund Security Advisories publishes new changes.

Optional. Personalizes your daily digest.

Free. Unsubscribe anytime.