Nixpkgs security tracker

Login with GitHub
⚠️ You are using a production deployment that is still only suitable for demo purposes. Any work done in this might be wiped later without notice.

Suggestions search

With package: minimal-bootstrap.gnutar-musl

Found 1 matching suggestions

View:
Compact
Detailed
Untriaged
Permalink CVE-2026-40200
8.1 HIGH
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
created 4 days, 4 hours ago
An issue was discovered in musl libc 0.7.10 through 1.2.6. …

An issue was discovered in musl libc 0.7.10 through 1.2.6. Stack-based memory corruption can occur during qsort of very large arrays, due to incorrectly implemented double-word primitives. The number of elements must exceed about seven million, i.e., the 32nd Leonardo number on 32-bit platforms (or the 64th Leonardo number on 64-bit platforms, which is not practical).

Affected products

musl
  • =<1.2.6

Matching in nixpkgs

pkgs.musl

Efficient, small, quality libc implementation

pkgs.musl-fts

Implementation of fts(3) for musl-libc

pkgs.musl-obstack

Extraction of the obstack functions and macros from GNU libiberty for use with musl-libc