Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-4438

Опубликовано: 20 мар. 2026
Источник: redhat
CVSS3: 4
EPSS Низкий

Описание

Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend in the GNU C library version 2.34 to version 2.43 could result in an invalid DNS hostname being returned to the caller in violation of the DNS specification.

A flaw was found in the GNU C library (glibc). When applications use the gethostbyaddr or gethostbyaddr_r functions with a nsswitch.conf configuration that specifies glibc's DNS backend, the library may return an invalid DNS hostname. This violates the DNS specification and could lead to applications receiving incorrect hostname information, potentially impacting network operations or security decisions.

Отчет

This is a LOW impact flaw where glibc's gethostbyaddr and gethostbyaddr_r functions may return an invalid DNS hostname. This occurs when applications use a nsswitch.conf configuration that specifies glibc's DNS backend. This could lead to applications receiving incorrect hostname information, potentially affecting network operations or security decisions on Red Hat Enterprise Linux and OpenShift Container Platform.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10glibcFix deferred
Red Hat Enterprise Linux 6compat-glibcFix deferred
Red Hat Enterprise Linux 6glibcFix deferred
Red Hat Enterprise Linux 7compat-glibcFix deferred
Red Hat Enterprise Linux 7glibcFix deferred
Red Hat Enterprise Linux 8glibcFix deferred
Red Hat Enterprise Linux 9glibcFix deferred
Red Hat OpenShift Container Platform 4rhcosFix deferred

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-838
https://bugzilla.redhat.com/show_bug.cgi?id=2449783glibc: glibc: Invalid DNS hostname returned via gethostbyaddr functions

EPSS

Процентиль: 8%
0.0003
Низкий

4 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.4
ubuntu
20 дней назад

Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend in the GNU C library version 2.34 to version 2.43 could result in an invalid DNS hostname being returned to the caller in violation of the DNS specification.

CVSS3: 5.4
nvd
20 дней назад

Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend in the GNU C library version 2.34 to version 2.43 could result in an invalid DNS hostname being returned to the caller in violation of the DNS specification.

CVSS3: 5.9
msrc
17 дней назад

gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames

CVSS3: 5.4
debian
20 дней назад

Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.co ...

CVSS3: 5.4
github
20 дней назад

Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend in the GNU C library version 2.34 to version 2.43 could result in an invalid DNS hostname being returned to the caller in violation of the DNS specification.

EPSS

Процентиль: 8%
0.0003
Низкий

4 Medium

CVSS3