Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend in the GNU C Library version 2.34 to version 2.43 could, with a crafted response from the configured DNS server, result in a violation of the DNS specification that causes the application to treat a non-answer section of the DNS response as a valid answer.

Project Subscriptions

No data.

Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 20 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Description Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend in the GNU C Library version 2.34 to version 2.43 could, with a crafted response from the configured DNS server, result in a violation of the DNS specification that causes the application to treat a non-answer section of the DNS response as a valid answer.
Title gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response
Weaknesses CWE-125
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: glibc

Published:

Updated: 2026-03-20T19:59:00.427Z

Reserved: 2026-03-19T19:55:42.906Z

Link: CVE-2026-4437

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-20T20:16:49.477

Modified: 2026-03-20T20:16:49.477

Link: CVE-2026-4437

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses