Calling getnetbyaddr or getnetbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend for networks and queries for a zero-valued network in the GNU C Library version 2.0 to version 2.42 can leak stack contents to the configured DNS resolver.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 16 Jan 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Gnu
Gnu glibc |
|
| Vendors & Products |
Gnu
Gnu glibc |
Fri, 16 Jan 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Thu, 15 Jan 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Calling getnetbyaddr or getnetbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend for networks and queries for a zero-valued network in the GNU C Library version 2.0 to version 2.42 can leak stack contents to the configured DNS resolver. | |
| Title | getnetbyaddr and getnetbyaddr_r leak stack contents to DNS resovler | |
| Weaknesses | CWE-908 | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: glibc
Published:
Updated: 2026-01-15T22:08:41.630Z
Reserved: 2026-01-13T19:02:42.388Z
Link: CVE-2026-0915
No data.
Status : Received
Published: 2026-01-15T22:16:12.457
Modified: 2026-01-15T22:16:12.457
Link: CVE-2026-0915
OpenCVE Enrichment
Updated: 2026-01-16T13:43:15Z
Weaknesses