vulnerability
SUSE: CVE-2026-0915: SUSE Linux Security Advisory
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 8 | (AV:N/AC:L/Au:N/C:C/I:N/A:N) | Jan 29, 2026 | Feb 4, 2026 | Feb 5, 2026 |
Severity
8
CVSS
(AV:N/AC:L/Au:N/C:C/I:N/A:N)
Published
Jan 29, 2026
Added
Feb 4, 2026
Modified
Feb 5, 2026
Description
Calling getnetbyaddr or getnetbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend for networks and queries for a zero-valued network in the GNU C Library version 2.0 to version 2.42 can leak stack contents to the configured DNS resolver.
Solutions
suse-upgrade-cross-aarch64-glibc-develsuse-upgrade-cross-ppc64le-glibc-develsuse-upgrade-cross-riscv64-glibc-develsuse-upgrade-cross-s390x-glibc-develsuse-upgrade-glibcsuse-upgrade-glibc-32bitsuse-upgrade-glibc-develsuse-upgrade-glibc-devel-32bitsuse-upgrade-glibc-devel-staticsuse-upgrade-glibc-devel-static-32bitsuse-upgrade-glibc-extrasuse-upgrade-glibc-gconv-modules-extrasuse-upgrade-glibc-htmlsuse-upgrade-glibc-i18ndatasuse-upgrade-glibc-infosuse-upgrade-glibc-langsuse-upgrade-glibc-localesuse-upgrade-glibc-locale-basesuse-upgrade-glibc-locale-base-32bitsuse-upgrade-glibc-profilesuse-upgrade-glibc-profile-32bitsuse-upgrade-glibc-utilssuse-upgrade-glibc-utils-32bitsuse-upgrade-libnsl1suse-upgrade-libnsl1-32bitsuse-upgrade-nscd
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.