<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
	<DocumentTitle xml:lang="en">An update for glibc is now available for openEuler-22.03-LTS-SP4</DocumentTitle>
	<DocumentType>Security Advisory</DocumentType>
	<DocumentPublisher Type="Vendor">
		<ContactDetails>openeuler-security@openeuler.org</ContactDetails>
		<IssuingAuthority>openEuler security committee</IssuingAuthority>
	</DocumentPublisher>
	<DocumentTracking>
		<Identification>
			<ID>openEuler-SA-2026-1202</ID>
		</Identification>
		<Status>Final</Status>
		<Version>1.0</Version>
		<RevisionHistory>
			<Revision>
				<Number>1.0</Number>
				<Date>2026-01-23</Date>
				<Description>Initial</Description>
			</Revision>
		</RevisionHistory>
		<InitialReleaseDate>2026-01-23</InitialReleaseDate>
		<CurrentReleaseDate>2026-01-23</CurrentReleaseDate>
		<Generator>
			<Engine>openEuler SA Tool V1.0</Engine>
			<Date>2026-01-23</Date>
		</Generator>
	</DocumentTracking>
	<DocumentNotes>
		<Note Title="Synopsis" Type="General" Ordinal="1" xml:lang="en">glibc security update</Note>
		<Note Title="Summary" Type="General" Ordinal="2" xml:lang="en">An update for glibc is now available for openEuler-22.03-LTS-SP4</Note>
		<Note Title="Description" Type="General" Ordinal="3" xml:lang="en">The GNU C Library project provides the core libraries for the GNU system and GNU/Linux systems, as well as many other systems that use Linux as the kernel. These libraries provide critical APIs including ISO C11, POSIX.1-2008, BSD, OS-specific APIs and more. These APIs include such foundational facilities as open, read, write, malloc, printf, getaddrinfo, dlopen, pthread_create, crypt,  login, exit and more.

Security Fix(es):

Passing too large an alignment to the memalign suite of functions (memalign, posix_memalign, aligned_alloc) in the GNU C Library version 2.30 to 2.42 may result in an integer overflow, which could consequently result in a heap corruption.

Note that the attacker must have control over both, the size as well as the alignment arguments of the memalign function to be able to exploit this.  The size parameter must be close enough to PTRDIFF_MAX so as to overflow size_t along with the large alignment argument.  This limits the malicious inputs for the alignment for memalign to the range [1&lt;&lt;62+ 1, 1&lt;&lt;63] and exactly 1&lt;&lt;63 for posix_memalign and aligned_alloc.

Typically the alignment argument passed to such functions is a known constrained quantity (e.g. page size, block size, struct sizes) and is not attacker controlled, because of which this may not be easily exploitable in practice.  An application bug could potentially result in the input alignment being too large, e.g. due to a different buffer overflow or integer overflow in the application or its dependent libraries, but that is again an uncommon usage pattern given typical sources of alignments.(CVE-2026-0861)

Calling getnetbyaddr or getnetbyaddr_r with a configured nsswitch.conf that specifies the library&apos;s DNS backend for networks and queries for a zero-valued network in the GNU C Library version 2.0 to version 2.42 can leak stack contents to the configured DNS resolver.(CVE-2026-0915)</Note>
		<Note Title="Topic" Type="General" Ordinal="4" xml:lang="en">An update for glibc is now available for master/openEuler-22.03-LTS-SP3/openEuler-22.03-LTS-SP4/openEuler-24.03-LTS/openEuler-24.03-LTS-Next/openEuler-24.03-LTS-SP1/openEuler-24.03-LTS-SP2/openEuler-24.03-LTS-SP3.

openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.</Note>
		<Note Title="Severity" Type="General" Ordinal="5" xml:lang="en">High</Note>
		<Note Title="Affected Component" Type="General" Ordinal="6" xml:lang="en">glibc</Note>
	</DocumentNotes>
	<DocumentReferences>
		<Reference Type="Self">
			<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1202</URL>
		</Reference>
		<Reference Type="openEuler CVE">
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-0861</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-0915</URL>
		</Reference>
		<Reference Type="Other">
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2026-0861</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2026-0915</URL>
		</Reference>
	</DocumentReferences>
	<ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
		<Branch Type="Product Name" Name="openEuler">
			<FullProductName ProductID="openEuler-22.03-LTS-SP4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">openEuler-22.03-LTS-SP4</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="aarch64">
			<FullProductName ProductID="glibc-2.34-172" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">glibc-2.34-172.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="glibc-all-langpacks-2.34-172" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">glibc-all-langpacks-2.34-172.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="glibc-common-2.34-172" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">glibc-common-2.34-172.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="glibc-compat-2.17-2.34-172" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">glibc-compat-2.17-2.34-172.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="glibc-debuginfo-2.34-172" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">glibc-debuginfo-2.34-172.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="glibc-debugsource-2.34-172" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">glibc-debugsource-2.34-172.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="glibc-debugutils-2.34-172" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">glibc-debugutils-2.34-172.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="glibc-devel-2.34-172" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">glibc-devel-2.34-172.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="glibc-locale-archive-2.34-172" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">glibc-locale-archive-2.34-172.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="glibc-locale-source-2.34-172" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">glibc-locale-source-2.34-172.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="glibc-nss-devel-2.34-172" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">glibc-nss-devel-2.34-172.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="libnsl-2.34-172" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">libnsl-2.34-172.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="nscd-2.34-172" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">nscd-2.34-172.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="nss_modules-2.34-172" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">nss_modules-2.34-172.oe2203sp4.aarch64.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="src">
			<FullProductName ProductID="glibc-2.34-172" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">glibc-2.34-172.oe2203sp4.src.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="x86_64">
			<FullProductName ProductID="glibc-2.34-172" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">glibc-2.34-172.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="glibc-all-langpacks-2.34-172" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">glibc-all-langpacks-2.34-172.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="glibc-common-2.34-172" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">glibc-common-2.34-172.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="glibc-compat-2.17-2.34-172" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">glibc-compat-2.17-2.34-172.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="glibc-debuginfo-2.34-172" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">glibc-debuginfo-2.34-172.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="glibc-debugsource-2.34-172" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">glibc-debugsource-2.34-172.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="glibc-debugutils-2.34-172" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">glibc-debugutils-2.34-172.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="glibc-devel-2.34-172" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">glibc-devel-2.34-172.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="glibc-locale-archive-2.34-172" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">glibc-locale-archive-2.34-172.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="glibc-locale-source-2.34-172" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">glibc-locale-source-2.34-172.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="glibc-nss-devel-2.34-172" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">glibc-nss-devel-2.34-172.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="libnsl-2.34-172" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">libnsl-2.34-172.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="nscd-2.34-172" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">nscd-2.34-172.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="nss_modules-2.34-172" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">nss_modules-2.34-172.oe2203sp4.x86_64.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="noarch">
			<FullProductName ProductID="glibc-help-2.34-172" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">glibc-help-2.34-172.oe2203sp4.noarch.rpm</FullProductName>
		</Branch>
	</ProductTree>
	<Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Passing too large an alignment to the memalign suite of functions (memalign, posix_memalign, aligned_alloc) in the GNU C Library version 2.30 to 2.42 may result in an integer overflow, which could consequently result in a heap corruption.

Note that the attacker must have control over both, the size as well as the alignment arguments of the memalign function to be able to exploit this.  The size parameter must be close enough to PTRDIFF_MAX so as to overflow size_t along with the large alignment argument.  This limits the malicious inputs for the alignment for memalign to the range [1&lt;&lt;62+ 1, 1&lt;&lt;63] and exactly 1&lt;&lt;63 for posix_memalign and aligned_alloc.

Typically the alignment argument passed to such functions is a known constrained quantity (e.g. page size, block size, struct sizes) and is not attacker controlled, because of which this may not be easily exploitable in practice.  An application bug could potentially result in the input alignment being too large, e.g. due to a different buffer overflow or integer overflow in the application or its dependent libraries, but that is again an uncommon usage pattern given typical sources of alignments.</Note>
		</Notes>
		<ReleaseDate>2026-01-23</ReleaseDate>
		<CVE>CVE-2026-0861</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>High</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>8.4</BaseScore>
				<Vector>AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>glibc security update</Description>
				<DATE>2026-01-23</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1202</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="2" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Calling getnetbyaddr or getnetbyaddr_r with a configured nsswitch.conf that specifies the library&apos;s DNS backend for networks and queries for a zero-valued network in the GNU C Library version 2.0 to version 2.42 can leak stack contents to the configured DNS resolver.</Note>
		</Notes>
		<ReleaseDate>2026-01-23</ReleaseDate>
		<CVE>CVE-2026-0915</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>High</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>7.5</BaseScore>
				<Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>glibc security update</Description>
				<DATE>2026-01-23</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1202</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
</cvrfdoc>