glibc 2.342.43 DNS hostname violation via gethostbyaddr
CVE-2026-4438 Published on March 20, 2026

gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames
Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend in the GNU C library version 2.34 to version 2.43 could result in an invalid DNS hostname being returned to the caller in violation of the DNS specification.

NVD

Weakness Type

Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.


Products Associated with CVE-2026-4438

Want to know whenever a new CVE is published for GNU Glibc? stack.watch will email you.

 

Affected Versions

The GNU C Library glibc:

Exploit Probability

EPSS
0.04%
Percentile
10.92%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.