Source: glibc
Version: 2.42-7
Severity: important
Tags: security upstream
Forwarded: https://sourceware.org/bugzilla/show_bug.cgi?id=33802
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>
Control: found -1 2.41-12+deb13u1
Control: found -1 2.41-12
Control: found -1 2.36-9+deb12u13
Control: found -1 2.36-9+deb12u7
Control: found -1 2.36-9

Hi,

The following vulnerability was published for glibc.

CVE-2026-0915[0]:
| Calling getnetbyaddr or getnetbyaddr_r with a configured
| nsswitch.conf that specifies the library's DNS backend for networks
| and queries for a zero-valued network in the GNU C Library version
| 2.0 to version 2.42 can leak stack contents to the configured DNS
| resolver.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-0915
    https://www.cve.org/CVERecord?id=CVE-2026-0915
[1] https://sourceware.org/bugzilla/show_bug.cgi?id=33802

Regards,
Salvatore

Reply via email to