Description
Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend in the GNU C Library version 2.34 to version 2.43 could, with a crafted response from the configured DNS server, result in a violation of the DNS specification that causes the application to treat a non-answer section of the DNS response as a valid answer.
INFO
Published Date :
2026-03-20T19:59:00.427Z
Last Modified :
2026-03-23T15:13:56.930Z
Source :
glibc
AFFECTED PRODUCTS
The following products are affected by CVE-2026-4437 vulnerability.
| Vendors | Products |
|---|---|
| Gnu |
|
| The Gnu C Library |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-4437.
CVSS Vulnerability Scoring System
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact