CVE-2026-4437

Published Mar 20, 2026

Last updated 23 days ago

Overview

Description
Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend in the GNU C Library version 2.34 to version 2.43 could, with a crafted response from the configured DNS server, result in a violation of the DNS specification that causes the application to treat a non-answer section of the DNS response as a valid answer.
Source
3ff69d7a-14f2-4f67-a097-88dee7810d18
NVD status
Analyzed
Products
glibc

Risk scores

CVSS 3.1

Type
Secondary
Base score
7.5
Impact score
3.6
Exploitability score
3.9
Vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Severity
HIGH

Weaknesses

3ff69d7a-14f2-4f67-a097-88dee7810d18
CWE-125

Social media

Hype score
Not currently trending

Configurations

References

Sources include official advisories and independent security research.