CVE-2026-0915
Published: January 18, 2026Last modified: January 20, 2026
Description
Calling getnetbyaddr or getnetbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend for networks and queries for a zero-valued network in the GNU C Library version 2.0 to version 2.42 can leak stack contents to the configured DNS resolver.
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score | 7.5 |
| Attack Vector | NETWORK |
| Attack complexity | LOW |
| Privileges required | NONE |
| User interaction | NONE |
| Scope | UNCHANGED |
| Confidentiality | HIGH |
| Integrity impact | NONE |
| Availability impact | NONE |
| Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
Status
| Product | Release | Package | Status |
|---|---|---|---|
| Alpaquita Linux | 23 LTS | glibc | Fixed (2.37.0-r20) |
| 25 LTS | glibc | Fixed (2.39.0-r5) | |
| Stream | glibc | Fixed (2.39.0-r6) | |
| Hardened Containers | 23 LTS | glibc | Fixed (2.37.0-r20) |
| 25 LTS | glibc | Fixed (2.39.0-r5) | |
| Stream | glibc | Fixed (2.39.0-r6) |