Description

Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend in the GNU C Library version 2.34 to version 2.43 could, with a crafted response from the configured DNS server, result in a violation of the DNS specification that causes the application to treat a non-answer section of the DNS response as a valid answer.

INFO

Published Date :

2026-03-20T19:59:00.427Z

Last Modified :

2026-03-23T15:13:56.930Z

Source :

glibc
AFFECTED PRODUCTS

The following products are affected by CVE-2026-4437 vulnerability.

Vendors Products
Gnu
  • Glibc
The Gnu C Library
  • Glibc
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2026-4437.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact