Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 07 Apr 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Gnu
Gnu glibc |
|
| CPEs | cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Gnu
Gnu glibc |
Mon, 23 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Mon, 23 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 23 Mar 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-1286 | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Mon, 23 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
The Gnu C Library
The Gnu C Library glibc |
|
| Vendors & Products |
The Gnu C Library
The Gnu C Library glibc |
Fri, 20 Mar 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend in the GNU C Library version 2.34 to version 2.43 could, with a crafted response from the configured DNS server, result in a violation of the DNS specification that causes the application to treat a non-answer section of the DNS response as a valid answer. | |
| Title | gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response | |
| Weaknesses | CWE-125 | |
| References |
|
Status: PUBLISHED
Assigner: glibc
Published:
Updated: 2026-03-23T15:13:56.930Z
Reserved: 2026-03-19T19:55:42.906Z
Link: CVE-2026-4437
Updated: 2026-03-23T15:10:49.136Z
Status : Analyzed
Published: 2026-03-20T20:16:49.477
Modified: 2026-04-07T18:41:36.647
Link: CVE-2026-4437
OpenCVE Enrichment
Updated: 2026-04-08T20:01:26Z