Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 14 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 14 Apr 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | musl: musl libc: Arbitrary code execution and denial of service via stack-based memory corruption in qsort | |
| Weaknesses | CWE-190 | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Fri, 10 Apr 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 10 Apr 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An issue was discovered in musl libc 0.7.10 through 1.2.6. Stack-based memory corruption can occur during qsort of very large arrays, due to incorrectly implemented double-word primitives. The number of elements must exceed about seven million, i.e., the 32nd Leonardo number on 32-bit platforms (or the 64th Leonardo number on 64-bit platforms, which is not practical). | |
| First Time appeared |
Musl-libc
Musl-libc musl |
|
| Weaknesses | CWE-670 | |
| CPEs | cpe:2.3:a:musl-libc:musl:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Musl-libc
Musl-libc musl |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-04-14T14:32:24.901Z
Reserved: 2026-04-10T00:00:00.000Z
Link: CVE-2026-40200
Updated: 2026-04-10T17:17:25.925Z
Status : Deferred
Published: 2026-04-10T17:17:14.107
Modified: 2026-04-27T19:18:46.690
Link: CVE-2026-40200
OpenCVE Enrichment
Updated: 2026-04-14T16:36:38Z