File _patchinfo of Package patchinfo.42995
<patchinfo incident="42995"> <issue tracker="cve" id="2026-0915"/> <issue tracker="cve" id="2025-15281"/> <issue tracker="cve" id="2026-0861"/> <issue tracker="cve" id="2025-8058"/> <issue tracker="bnc" id="1257005">VUL-0: CVE-2025-15281: glibc: uninitialized memory may cause the process abort</issue> <issue tracker="bnc" id="1256766">VUL-0: CVE-2026-0861: glibc: inadequate size check in the memalign suite may result in an integer overflow</issue> <issue tracker="bnc" id="1246965">VUL-0: CVE-2025-8058: glibc: a malloc failure in regcomp function can lead to a double free</issue> <issue tracker="bnc" id="1256822">VUL-0: CVE-2026-0915: glibc: Uninitialized stack buffer used as DNS query name when net==0 in _nss_dns_getnetbyaddr_r</issue> <packager>Andreas_Schwab</packager> <rating>important</rating> <category>security</category> <summary>Security update for glibc</summary> <description>This update for glibc fixes the following issues: - CVE-2026-0861: memalign: reinstate alignment overflow check (bsc#1256766) - CVE-2026-0915: resolv: Fix NSS DNS backend for getnetbyaddr (bsc#1256822) - CVE-2025-15281: posix: Reset wordexp_t fields with WRDE_REUSE (bsc#1257005) - CVE-2025-8058: posix: Fix double-free after allocation failure in regcomp (bsc#1246965) </description> </patchinfo>