|
|
Log in / Subscribe / Register

Mageia alert MGASA-2026-0022 (glibc)

From:  Mageia Updates <updates-announce@ml.mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2026-0022: Updated glibc packages fix security vulnerabilities
Date:  Tue, 27 Jan 2026 19:21:10 +0100
Message-ID:  <20260127182110.66E60A0DC4@duvel.mageia.org>
Archive-link:  Article

MGASA-2026-0022 - Updated glibc packages fix security vulnerabilities Publication date: 27 Jan 2026 URL: https://advisories.mageia.org/MGASA-2026-0022.html Type: security Affected Mageia releases: 9 CVE: CVE-2026-0861, CVE-2026-0915, CVE-2025-15281 Description: Integer overflow in memalign leads to heap corruption. (CVE-2026-0861) getnetbyaddr and getnetbyaddr_r leak stack contents to DNS resovler. (CVE-2026-0915) wordexp with WRDE_REUSE and WRDE_APPEND may return uninitialized memory. (CVE-2025-15281) References: - https://bugs.mageia.org/show_bug.cgi?id=35036 - https://www.openwall.com/lists/oss-security/2026/01/16/5 - https://www.openwall.com/lists/oss-security/2026/01/16/6 - https://www.openwall.com/lists/oss-security/2026/01/20/3 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0861 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0915 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1... SRPMS: - 9/core/glibc-2.36-59.mga9


to post comments


Copyright © 2026, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds