Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2026-4437

Опубликовано: 20 мар. 2026
Источник: debian

Описание

Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend in the GNU C Library version 2.34 to version 2.43 could, with a crafted response from the configured DNS server, result in a violation of the DNS specification that causes the application to treat a non-answer section of the DNS response as a valid answer.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
glibcfixed2.42-14package
glibcno-dsatrixiepackage
glibcno-dsabookwormpackage
glibcpostponedbullseyepackage

Примечания

  • https://sourceware.org/bugzilla/show_bug.cgi?id=34014

  • Proposed patch: https://inbox.sourceware.org/libc-alpha/20260320194250.1089143-1-carlos@redhat.com/

  • https://www.openwall.com/lists/oss-security/2026/03/23/2

Связанные уязвимости

CVSS3: 7.5
ubuntu
20 дней назад

Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend in the GNU C Library version 2.34 to version 2.43 could, with a crafted response from the configured DNS server, result in a violation of the DNS specification that causes the application to treat a non-answer section of the DNS response as a valid answer.

CVSS3: 6.5
redhat
20 дней назад

Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend in the GNU C Library version 2.34 to version 2.43 could, with a crafted response from the configured DNS server, result in a violation of the DNS specification that causes the application to treat a non-answer section of the DNS response as a valid answer.

CVSS3: 7.5
nvd
20 дней назад

Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend in the GNU C Library version 2.34 to version 2.43 could, with a crafted response from the configured DNS server, result in a violation of the DNS specification that causes the application to treat a non-answer section of the DNS response as a valid answer.

CVSS3: 5.9
msrc
19 дней назад

gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response

CVSS3: 7.5
github
20 дней назад

Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend in the GNU C Library version 2.34 to version 2.43 could, with a crafted response from the configured DNS server, result in a violation of the DNS specification that causes the application to treat a non-answer section of the DNS response as a valid answer.