CVE-2026-4437
gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response
CVSS Score
7.5
EPSS Score
0.0%
EPSS Percentile
5th
Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend in the GNU C Library version 2.34 to version 2.43 could, with a crafted response from the configured DNS server, result in a violation of the DNS specification that causes the application to treat a non-answer section of the DNS response as a valid answer.
| CWE | CWE-125 |
| Vendor | the gnu c library |
| Product | glibc |
| Published | Mar 20, 2026 |
| Last Updated | Mar 23, 2026 |
Stay Ahead of the Next One
Get instant alerts for the gnu c library glibc
Be the first to know when new high vulnerabilities affecting the gnu c library glibc are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
The GNU C Library / glibc
2.34 โค 2.43
References
Credits
Antonio Maini (0rbitingZer0) - [email protected] ๐ Kevin Farrell