CVE-2026-40200

| EUVD-2026-21496 HIGH
2026-04-10 mitre
8.1
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
Analysis Generated
Apr 10, 2026 - 16:30 vuln.today
EUVD ID Assigned
Apr 10, 2026 - 16:30 euvd
EUVD-2026-21496
CVE Published
Apr 10, 2026 - 00:00 nvd
HIGH 8.1

Description

An issue was discovered in musl libc 0.7.10 through 1.2.6. Stack-based memory corruption can occur during qsort of very large arrays, due to incorrectly implemented double-word primitives. The number of elements must exceed about seven million, i.e., the 32nd Leonardo number on 32-bit platforms (or the 64th Leonardo number on 64-bit platforms, which is not practical).

Analysis

Stack-based buffer overflow in musl libc 0.7.10 through 1.2.6 allows local attackers with high complexity requirements to corrupt memory during qsort operations on exceptionally large arrays (exceeding ~7 million elements on 32-bit systems, corresponding to the 32nd Leonardo number). Exploitation requires sorting arrays approaching billion-element scale on 64-bit platforms. …

Sign in for full analysis, threat intelligence, and remediation guidance.

Remediation

Within 24 hours: Inventory all systems and containers running musl libc versions 0.7.10-1.2.6 (check `ldd --version` or `musl-libc --version`; identify Alpine Linux, BusyBox-based images, and embedded Linux deployments). Within 7 days: Evaluate whether applications in your environment process qsort operations on arrays exceeding 7 million elements (32-bit) or approaching 1 billion elements (64-bit); document findings in your asset inventory. …

Sign in for detailed remediation steps.

Priority Score

40
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +40
POC: 0

Share

CVE-2026-40200 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy