CVE-2026-0915Use of Uninitialized Resource in GNU C Library Glibc

Severity
7.5HIGHNVD
EPSS
0.0%
top 94.41%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 15
Latest updateFeb 3

Description

Calling getnetbyaddr or getnetbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend for networks and queries for a zero-valued network in the GNU C Library version 2.0 to version 2.42 can leak stack contents to the configured DNS resolver.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

CVEListV5the_gnu_c_library/glibc2.02.42
Debiangnu/glibc< 2.41-12+deb13u2+1
NVDgnu/glibc2.02.42

🔴Vulnerability Details

3
GHSA
GHSA-xp56-6525-9chf: Calling getnetbyaddr or getnetbyaddr_r with a configured nsswitch2026-01-16
CVEList
getnetbyaddr and getnetbyaddr_r leak stack contents to DNS resovler2026-01-15
OSV
CVE-2026-0915: Calling getnetbyaddr or getnetbyaddr_r with a configured nsswitch2026-01-15

📋Vendor Advisories

3
Ubuntu
GNU C Library vulnerabilities2026-02-03
Red Hat
glibc: glibc: Information disclosure via zero-valued network query2026-01-15
Debian
CVE-2026-0915: glibc - Calling getnetbyaddr or getnetbyaddr_r with a configured nsswitch.conf that spec...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-0915 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-0915 — Use of Uninitialized Resource | cvebase