Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 07 Apr 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Gnu
Gnu glibc |
|
| CPEs | cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Gnu
Gnu glibc |
Mon, 23 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-88 | |
| Metrics |
cvssV3_1
|
ssvc
|
Mon, 23 Mar 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-838 | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Mon, 23 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
The Gnu C Library
The Gnu C Library glibc |
|
| Vendors & Products |
The Gnu C Library
The Gnu C Library glibc |
Fri, 20 Mar 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend in the GNU C library version 2.34 to version 2.43 could result in an invalid DNS hostname being returned to the caller in violation of the DNS specification. | |
| Title | gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames | |
| Weaknesses | CWE-20 | |
| References |
|
Status: PUBLISHED
Assigner: glibc
Published:
Updated: 2026-03-23T15:06:16.376Z
Reserved: 2026-03-19T19:55:44.639Z
Link: CVE-2026-4438
Updated: 2026-03-23T15:06:06.683Z
Status : Analyzed
Published: 2026-03-20T20:16:49.623
Modified: 2026-04-07T18:40:02.177
Link: CVE-2026-4438
OpenCVE Enrichment
Updated: 2026-04-08T20:01:25Z