CVE-2026-4437 PUBLISHED

gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response

Assigner: glibc
Reserved: 19.03.2026 Published: 20.03.2026 Updated: 20.03.2026

Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend in the GNU C Library version 2.34 to version 2.43 could, with a crafted response from the configured DNS server, result in a violation of the DNS specification that causes the application to treat a non-answer section of the DNS response as a valid answer.

Product Status

Vendor The GNU C Library
Product glibc
Versions Default: unaffected
  • affected from 2.34 to 2.43 (incl.)

Credits

  • Antonio Maini (0rbitingZer0) - 0rbitingZer0@proton.me finder
  • Kevin Farrell reporter

References

Problem Types

  • CWE-125 Out-of-bounds read CWE

Impacts

  • CAPEC-142 DNS Cache Poisoning