the following vulnerability was published for glibc.
| The DNS stub resolver in the GNU C Library (aka glibc or libc6) before
| version 2.26, when EDNS support is enabled, will solicit large UDP
| responses from name servers, potentially simplifying off-path DNS
| spoofing attacks due to IP fragmentation.
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.