๐Ÿ” CVE Alert

CVE-2026-4437

HIGH 7.5

gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response

CVSS Score
7.5
EPSS Score
0.0%
EPSS Percentile
5th

Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend in the GNU C Library version 2.34 to version 2.43 could, with a crafted response from the configured DNS server, result in a violation of the DNS specification that causes the application to treat a non-answer section of the DNS response as a valid answer.

CWE CWE-125
Vendor the gnu c library
Product glibc
Published Mar 20, 2026
Last Updated Mar 23, 2026
Stay Ahead of the Next One

Get instant alerts for the gnu c library glibc

Be the first to know when new high vulnerabilities affecting the gnu c library glibc are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

The GNU C Library / glibc
2.34 โ‰ค 2.43

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
sourceware.org: https://sourceware.org/bugzilla/show_bug.cgi?id=34014

Credits

Antonio Maini (0rbitingZer0) - [email protected] ๐Ÿ” Kevin Farrell