Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2026-0915

Summary
Assigner-glibc
Assigner Org ID-3ff69d7a-14f2-4f67-a097-88dee7810d18
Published At-15 Jan, 2026 | 22:08
Updated At-20 Jan, 2026 | 16:03
Rejected At-
Credits

getnetbyaddr and getnetbyaddr_r leak stack contents to DNS resovler

Calling getnetbyaddr or getnetbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend for networks and queries for a zero-valued network in the GNU C Library version 2.0 to version 2.42 can leak stack contents to the configured DNS resolver.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:glibc
Assigner Org ID:3ff69d7a-14f2-4f67-a097-88dee7810d18
Published At:15 Jan, 2026 | 22:08
Updated At:20 Jan, 2026 | 16:03
Rejected At:
▼CVE Numbering Authority (CNA)
getnetbyaddr and getnetbyaddr_r leak stack contents to DNS resovler

Calling getnetbyaddr or getnetbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend for networks and queries for a zero-valued network in the GNU C Library version 2.0 to version 2.42 can leak stack contents to the configured DNS resolver.

Affected Products
Vendor
The GNU C Library
Product
glibc
Default Status
unaffected
Versions
Affected
  • From 2.0 through 2.42 (custom)
Problem Types
TypeCWE IDDescription
CWECWE-908CWE-908 Use of Uninitialized Resource
Type: CWE
CWE ID: CWE-908
Description: CWE-908 Use of Uninitialized Resource
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
CAPEC-204CAPEC-204 Lifting Sensitive Data Embedded in Cache
CAPEC ID: CAPEC-204
Description: CAPEC-204 Lifting Sensitive Data Embedded in Cache
Solutions

Configurations

Workarounds

Exploits

Credits

finder
Igor Morgenstern, Aisle Research
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://sourceware.org/bugzilla/show_bug.cgi?id=33802
N/A
Hyperlink: https://sourceware.org/bugzilla/show_bug.cgi?id=33802
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.openwall.com/lists/oss-security/2026/01/16/6
N/A
Hyperlink: http://www.openwall.com/lists/oss-security/2026/01/16/6
Resource: N/A
2. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://sourceware.org/bugzilla/show_bug.cgi?id=33802
exploit
Hyperlink: https://sourceware.org/bugzilla/show_bug.cgi?id=33802
Resource:
exploit
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:3ff69d7a-14f2-4f67-a097-88dee7810d18
Published At:15 Jan, 2026 | 22:16
Updated At:23 Jan, 2026 | 19:36

Calling getnetbyaddr or getnetbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend for networks and queries for a zero-valued network in the GNU C Library version 2.0 to version 2.42 can leak stack contents to the configured DNS resolver.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Type: Secondary
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CPE Matches

GNU
gnu
>>glibc>>Versions from 2.0(inclusive) to 2.42(inclusive)
cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-908Secondary3ff69d7a-14f2-4f67-a097-88dee7810d18
CWE ID: CWE-908
Type: Secondary
Source: 3ff69d7a-14f2-4f67-a097-88dee7810d18
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://sourceware.org/bugzilla/show_bug.cgi?id=338023ff69d7a-14f2-4f67-a097-88dee7810d18
Broken Link
http://www.openwall.com/lists/oss-security/2026/01/16/6af854a3a-2127-422b-91ae-364da2661108
Mailing List
https://sourceware.org/bugzilla/show_bug.cgi?id=33802134c704f-9b21-4f2e-91b3-4a467353bcc0
Broken Link
Hyperlink: https://sourceware.org/bugzilla/show_bug.cgi?id=33802
Source: 3ff69d7a-14f2-4f67-a097-88dee7810d18
Resource:
Broken Link
Hyperlink: http://www.openwall.com/lists/oss-security/2026/01/16/6
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: https://sourceware.org/bugzilla/show_bug.cgi?id=33802
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Resource:
Broken Link

Change History

0
Information is not available yet

Similar CVEs

51Records found

CVE-2020-11828
Matching Score-4
Assigner-OPPO Mobile Telecommunication Corp., Ltd.
ShareView Details
Matching Score-4
Assigner-OPPO Mobile Telecommunication Corp., Ltd.
CVSS Score-7.5||HIGH
EPSS-0.32% / 54.25%
||
7 Day CHG~0.00%
Published-21 Apr, 2020 | 13:42
Updated-04 Aug, 2024 | 11:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In ColorOS (oppo mobile phone operating system, based on AOSP frameworks/native code position/services/surfaceflinger surfaceflinger.CPP), RGB is defined on the stack but uninitialized, so when the screenShot function to RGB value assignment, will not initialize the value is returned to the attackers, leading to values on the stack information leakage, the vulnerability can be used to bypass attackers ALSR.

Action-Not Available
Vendor-oppoOppo
Product-colorosColor OS
CWE ID-CWE-908
Use of Uninitialized Resource
  • Previous
  • 1
  • 2
  • Next
Details not found