CVE-2026-3184

NameCVE-2026-3184
DescriptionAccess control bypass due to improper hostname canonicalization
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1129313

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
util-linux (PTS)bullseye (security), bullseye2.36.1-8+deb11u2vulnerable
bookworm2.38.1-5+deb12u3vulnerable
bookworm (security)2.38.1-5+deb12u1vulnerable
trixie2.41-5vulnerable
forky, sid2.41.3-4vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
util-linuxsourceexperimental2.42~rc1-1
util-linuxsource(unstable)(unfixed)1129313

Notes

[trixie] - util-linux <no-dsa> (Minor issue)
[bookworm] - util-linux <ignored> (login not build from src:util-linux; only taken over in 2.40.2-3)
[bullseye] - util-linux <ignored> (login not build from src:util-linux; only taken over in 2.40.2-3)
https://bugzilla.redhat.com/show_bug.cgi?id=2442570
Fixed by: https://github.com/util-linux/util-linux/commit/8b29aeb081e297e48c4c1ac53d88ae07e1331984 (v2.42-rc1)

Search for package or bug name: Reporting problems