GNU C Library fixes security issue from 1996

The GNU C Library has addressed a long-standing security vulnerability that dates back to 1996. This fix, identified as CVE-2026-0915, patches a flaw present in the library since its early versions. The update aims to enhance security for systems relying on this fundamental component of Linux distributions.

The GNU C Library, commonly known as glibc, serves as a core component for many Linux-based systems, handling essential functions like memory management and system calls. On a recent update, developers released a patch for CVE-2026-0915, a security issue that has lingered since 1996.

This vulnerability was embedded in the library from its inception nearly three decades ago, potentially exposing systems to risks over the years. The fix comes as part of ongoing efforts to secure open-source software foundations. While specific details on the exploit's nature remain limited in initial reports, the correction underscores the importance of maintaining legacy code in modern computing environments.

Linux distributions and developers are encouraged to apply the update promptly to mitigate any potential threats. This event highlights the challenges of securing software with deep historical roots, where even ancient bugs can resurface in contemporary use cases. No immediate widespread exploits have been reported, but the proactive patch reinforces the robustness of the open-source ecosystem.

Labaran da ke da alaƙa

Illustration depicting Linux kernel maintainers extending LTS support timelines in a server room, symbolizing reversed cutbacks and enhanced stability for servers and devices.
Hoton da AI ya samar

Linux kernel extends LTS support for multiple releases, easing prior burnout-driven cutbacks

An Ruwaito ta hanyar AI Hoton da AI ya samar

Linux kernel maintainers have extended long-term support (LTS) for several key releases through 2026-2028, partially reversing a 2023 decision to limit support to two years amid contributor burnout. Stable maintainer Greg Kroah-Hartman updated the schedule following feedback from users, vendors, and fellow maintainer Sasha Levin, providing more time for security fixes in servers, Android devices, and appliances.

The GNU Project has released version 2.43 of the GNU C Library, known as glibc, six months after the previous update. This version advances compliance with the ISO C23 standard and includes security fixes, performance improvements, and new platform support. It introduces several new memory functions and optimizations for various architectures.

An Ruwaito ta hanyar AI

A security researcher has found that bugs in the Linux kernel often remain undetected for more than two years on average, with some persisting for over two decades. By analyzing 20 years of kernel development, Jenny Guanni Qu uncovered how these flaws quietly affect cloud systems, enterprises, and billions of devices. Her work highlights the challenges of maintaining secure open-source software.

Linux graphics developers have submitted patches to address virtual memory faults plaguing older AMD GCN GPUs. These fixes aim to enhance stability for cards like the HD 7000 and R9 290 series during Vulkan workloads. The changes come ahead of the Linux Kernel 6.19 release.

An Ruwaito ta hanyar AI

The Linux and open-source world saw a flurry of updates from February 9 to 15, 2026, including new versions of major distributions and software tools. Key highlights feature the Linux Kernel 6.19 and various desktop environment fixes. These releases focus on bug resolutions, performance improvements, and new features for users and developers.

Amazon Web Services has revealed a security flaw in its WorkSpaces client for Linux that allows local attackers to extract authentication tokens and access other users' virtual desktops. The vulnerability, CVE-2025-12779, affects client versions from 2023.0 to 2024.8 and carries a CVSS score of 8.8. AWS urges immediate upgrades to version 2025.0 or later to mitigate the risk.

An Ruwaito ta hanyar AI

Veeam has addressed three critical-severity security vulnerabilities that could expose backup servers to remote code execution attacks. The company issued patches to mitigate these risks. The announcement highlights ongoing concerns in cybersecurity for data protection tools.

 

 

 

Wannan shafin yana amfani da cookies

Muna amfani da cookies don nazari don inganta shafin mu. Karanta manufar sirri mu don ƙarin bayani.
Ƙi