File _patchinfo of Package patchinfo.42452
<patchinfo incident="42452"> <issue tracker="cve" id="2026-0861"/> <issue tracker="cve" id="2025-15281"/> <issue tracker="cve" id="2026-0915"/> <issue tracker="bnc" id="1256822">VUL-0: CVE-2026-0915: glibc: Uninitialized stack buffer used as DNS query name when net==0 in _nss_dns_getnetbyaddr_r</issue> <issue tracker="bnc" id="1256766">VUL-0: CVE-2026-0861: glibc: inadequate size check in the memalign suite may result in an integer overflow</issue> <issue tracker="bnc" id="1256437">glibc: NPTL: Optimize trylock for high cache contention workloads</issue> <issue tracker="bnc" id="1257005">VUL-0: CVE-2025-15281: glibc: uninitialized memory may cause the process abort</issue> <packager>Andreas_Schwab</packager> <rating>important</rating> <category>security</category> <summary>Security update for glibc</summary> <description>This update for glibc fixes the following issues: Security fixes: - CVE-2026-0861: Fixed inadequate size check in the memalign suite may result in an integer overflow (bsc#1256766). - CVE-2026-0915: Fixed uninitialized stack buffer used as DNS query name when net==0 in _nss_dns_getnetbyaddr_r (bsc#1256822). - CVE-2025-15281: Fixed uninitialized memory may cause the process abort (bsc#1257005). Other fixes: - NPTL: Optimize trylock for high cache contention workloads (bsc#1256437). </description> </patchinfo>