Description
Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend in the GNU C library version 2.34 to version 2.43 could result in an invalid DNS hostname being returned to the caller in violation of the DNS specification.
Published: 2026-03-20
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote misreporting of DNS hostnames
Action: Immediate Patch
AI Analysis

Impact

A flaw in glibc’s gethostbyaddr and gethostbyaddr_r functions can cause the library to return hostnames that do not conform to the DNS specification. The vulnerability arises when the nsswitch.conf configuration selects the DNS backend for name resolution in GNU C Library versions 2.34 through 2.43. The primary impact is that applications receiving these invalid hostnames may experience logic errors, incorrect routing, or validation failures, potentially leading to unintended behavior or denial of service in name‑resolution dependent components. The weakness is a classic input validation failure (CWE‑20) and improper handling of external data.

Affected Systems

Any system that uses glibc 2.34, 2.35, 2.36, 2.37, 2.38, 2.39, 2.40, 2.41, 2.42, or 2.43 and has an nsswitch.conf entry that specifies the DNS backend. This includes most Linux distributions and UNIX‑like operating systems that ship with these glibc versions.

Risk and Exploitability

The CVSS score of 5.4 classifies the issue as moderate, and the EPSS score of less than 1% indicates a low probability of exploitation in the wild. The vulnerability is not listed in CISA’s KEV catalog. Exploitation would require that an attacker can trigger a DNS lookup through glibc’s gethostbyaddr functions, either remotely via an application that performs such lookups or locally if an application can influence the DNS response. The description does not imply remote code execution or privilege escalation; the attack vector is inferred to be application‑level DNS resolution.

Generated by OpenCVE AI on April 7, 2026 at 22:39 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade GNU C Library to version 2.44 or later.
  • Verify that nsswitch.conf correctly specifies the DNS backend and that no legacy or unsupported entries remain.
  • If an immediate upgrade is not possible, consider removing or disabling the DNS backend for name resolution in nsswitch.conf and using an alternative resolver or local cache.

Generated by OpenCVE AI on April 7, 2026 at 22:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Gnu
Gnu glibc
CPEs cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
Vendors & Products Gnu
Gnu glibc

Mon, 23 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-88
Metrics cvssV3_1

{'score': 4.0, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}


Mon, 23 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-838
References
Metrics threat_severity

None

cvssV3_1

{'score': 4.0, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}

threat_severity

Low


Mon, 23 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared The Gnu C Library
The Gnu C Library glibc
Vendors & Products The Gnu C Library
The Gnu C Library glibc

Fri, 20 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Description Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend in the GNU C library version 2.34 to version 2.43 could result in an invalid DNS hostname being returned to the caller in violation of the DNS specification.
Title gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames
Weaknesses CWE-20
References

Subscriptions

Gnu Glibc
The Gnu C Library Glibc
cve-icon MITRE

Status: PUBLISHED

Assigner: glibc

Published:

Updated: 2026-03-23T15:06:16.376Z

Reserved: 2026-03-19T19:55:44.639Z

Link: CVE-2026-4438

cve-icon Vulnrichment

Updated: 2026-03-23T15:06:06.683Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-20T20:16:49.623

Modified: 2026-04-07T18:40:02.177

Link: CVE-2026-4438

cve-icon Redhat

Severity : Low

Publid Date: 2026-03-20T19:59:06Z

Links: CVE-2026-4438 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T20:01:25Z

Weaknesses