An issue was discovered in musl libc 0.7.10 through 1.2.6. Stack-based memory corruption can occur during qsort of very large arrays, due to incorrectly implemented double-word primitives. The number of elements must exceed about seven million, i.e., the 32nd Leonardo number on 32-bit platforms (or the 64th Leonardo number on 64-bit platforms, which is not practical).

Project Subscriptions

Vendors Products
Musl-libc Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 10 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Description An issue was discovered in musl libc 0.7.10 through 1.2.6. Stack-based memory corruption can occur during qsort of very large arrays, due to incorrectly implemented double-word primitives. The number of elements must exceed about seven million, i.e., the 32nd Leonardo number on 32-bit platforms (or the 64th Leonardo number on 64-bit platforms, which is not practical).
First Time appeared Musl-libc
Musl-libc musl
Weaknesses CWE-670
CPEs cpe:2.3:a:musl-libc:musl:*:*:*:*:*:*:*:*
Vendors & Products Musl-libc
Musl-libc musl
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-10T17:17:25.925Z

Reserved: 2026-04-10T00:00:00.000Z

Link: CVE-2026-40200

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-10T17:17:14.107

Modified: 2026-04-10T17:17:14.107

Link: CVE-2026-40200

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses