VYPR
High severity7.5NVD Advisory· Published Mar 20, 2026· Updated Apr 7, 2026

CVE-2026-4437

CVE-2026-4437

Description

Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend in the GNU C Library version 2.34 to version 2.43 could, with a crafted response from the configured DNS server, result in a violation of the DNS specification that causes the application to treat a non-answer section of the DNS response as a valid answer.

Affected products

1
  • cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
    Range: >=2.34,<=2.43

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

News mentions

0

No linked articles in our index yet.