Количество 19
Количество 19
CVE-2026-0861
Passing too large an alignment to the memalign suite of functions (memalign, posix_memalign, aligned_alloc) in the GNU C Library version 2.30 to 2.42 may result in an integer overflow, which could consequently result in a heap corruption. Note that the attacker must have control over both, the size as well as the alignment arguments of the memalign function to be able to exploit this. The size parameter must be close enough to PTRDIFF_MAX so as to overflow size_t along with the large alignment argument. This limits the malicious inputs for the alignment for memalign to the range [1<<62+ 1, 1<<63] and exactly 1<<63 for posix_memalign and aligned_alloc. Typically the alignment argument passed to such functions is a known constrained quantity (e.g. page size, block size, struct sizes) and is not attacker controlled, because of which this may not be easily exploitable in practice. An application bug could potentially result in the input alignment being too large, e.g. due to a differe...
CVE-2026-0861
Passing too large an alignment to the memalign suite of functions (memalign, posix_memalign, aligned_alloc) in the GNU C Library version 2.30 to 2.42 may result in an integer overflow, which could consequently result in a heap corruption. Note that the attacker must have control over both, the size as well as the alignment arguments of the memalign function to be able to exploit this. The size parameter must be close enough to PTRDIFF_MAX so as to overflow size_t along with the large alignment argument. This limits the malicious inputs for the alignment for memalign to the range [1<<62+ 1, 1<<63] and exactly 1<<63 for posix_memalign and aligned_alloc. Typically the alignment argument passed to such functions is a known constrained quantity (e.g. page size, block size, struct sizes) and is not attacker controlled, because of which this may not be easily exploitable in practice. An application bug could potentially result in the input alignment being too large, e.g. due to a differ...
CVE-2026-0861
Passing too large an alignment to the memalign suite of functions (memalign, posix_memalign, aligned_alloc) in the GNU C Library version 2.30 to 2.42 may result in an integer overflow, which could consequently result in a heap corruption. Note that the attacker must have control over both, the size as well as the alignment arguments of the memalign function to be able to exploit this. The size parameter must be close enough to PTRDIFF_MAX so as to overflow size_t along with the large alignment argument. This limits the malicious inputs for the alignment for memalign to the range [1<<62+ 1, 1<<63] and exactly 1<<63 for posix_memalign and aligned_alloc. Typically the alignment argument passed to such functions is a known constrained quantity (e.g. page size, block size, struct sizes) and is not attacker controlled, because of which this may not be easily exploitable in practice. An application bug could potentially result in the input alignment being too large, e.g. due to a differe
CVE-2026-0861
Integer overflow in memalign leads to heap corruption
CVE-2026-0861
Passing too large an alignment to the memalign suite of functions (mem ...
SUSE-SU-2026:0827-1
Security update for glibc-livepatches
SUSE-SU-2026:0499-1
Security update for glibc-livepatches
SUSE-SU-2026:0347-1
Security update for glibc-livepatches
GHSA-5pf6-63v3-88hw
Passing too large an alignment to the memalign suite of functions (memalign, posix_memalign, aligned_alloc, valloc, pvalloc) in the GNU C Library version 2.30 to 2.42 may result in an integer overflow, which could consequently result in a heap corruption.
BDU:2026-00915
Уязвимость функций memalign(), posix_memalign(), aligned_alloc(), valloc(), pvalloc() системной библиотеки GNU C Library, позволяющая нарушителю выполнить произвольный код, вызвать отказ в обслуживании или раскрыть защищаемую информацию
RLSA-2026:1334
Moderate: glibc security update
ELSA-2026-50078
ELSA-2026-50078: glibc security update (MODERATE)
ELSA-2026-1334
ELSA-2026-1334: glibc security update (MODERATE)
SUSE-SU-2026:0371-1
Security update for glibc
RLSA-2026:2786
Moderate: glibc security update
ELSA-2026-50120
ELSA-2026-50120: glibc security update (MODERATE)
ELSA-2026-2786
ELSA-2026-2786: glibc security update (MODERATE)
openSUSE-SU-2026:20133-1
Security update for glibc
SUSE-SU-2026:0896-1
Security update for glibc
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2026-0861 Passing too large an alignment to the memalign suite of functions (memalign, posix_memalign, aligned_alloc) in the GNU C Library version 2.30 to 2.42 may result in an integer overflow, which could consequently result in a heap corruption. Note that the attacker must have control over both, the size as well as the alignment arguments of the memalign function to be able to exploit this. The size parameter must be close enough to PTRDIFF_MAX so as to overflow size_t along with the large alignment argument. This limits the malicious inputs for the alignment for memalign to the range [1<<62+ 1, 1<<63] and exactly 1<<63 for posix_memalign and aligned_alloc. Typically the alignment argument passed to such functions is a known constrained quantity (e.g. page size, block size, struct sizes) and is not attacker controlled, because of which this may not be easily exploitable in practice. An application bug could potentially result in the input alignment being too large, e.g. due to a differe... | CVSS3: 8.4 | 0% Низкий | 2 месяца назад | |
CVE-2026-0861 Passing too large an alignment to the memalign suite of functions (memalign, posix_memalign, aligned_alloc) in the GNU C Library version 2.30 to 2.42 may result in an integer overflow, which could consequently result in a heap corruption. Note that the attacker must have control over both, the size as well as the alignment arguments of the memalign function to be able to exploit this. The size parameter must be close enough to PTRDIFF_MAX so as to overflow size_t along with the large alignment argument. This limits the malicious inputs for the alignment for memalign to the range [1<<62+ 1, 1<<63] and exactly 1<<63 for posix_memalign and aligned_alloc. Typically the alignment argument passed to such functions is a known constrained quantity (e.g. page size, block size, struct sizes) and is not attacker controlled, because of which this may not be easily exploitable in practice. An application bug could potentially result in the input alignment being too large, e.g. due to a differ... | CVSS3: 8.1 | 0% Низкий | 2 месяца назад | |
CVE-2026-0861 Passing too large an alignment to the memalign suite of functions (memalign, posix_memalign, aligned_alloc) in the GNU C Library version 2.30 to 2.42 may result in an integer overflow, which could consequently result in a heap corruption. Note that the attacker must have control over both, the size as well as the alignment arguments of the memalign function to be able to exploit this. The size parameter must be close enough to PTRDIFF_MAX so as to overflow size_t along with the large alignment argument. This limits the malicious inputs for the alignment for memalign to the range [1<<62+ 1, 1<<63] and exactly 1<<63 for posix_memalign and aligned_alloc. Typically the alignment argument passed to such functions is a known constrained quantity (e.g. page size, block size, struct sizes) and is not attacker controlled, because of which this may not be easily exploitable in practice. An application bug could potentially result in the input alignment being too large, e.g. due to a differe | CVSS3: 8.4 | 0% Низкий | 2 месяца назад | |
CVE-2026-0861 Integer overflow in memalign leads to heap corruption | CVSS3: 7.3 | 0% Низкий | около 1 месяца назад | |
CVE-2026-0861 Passing too large an alignment to the memalign suite of functions (mem ... | CVSS3: 8.4 | 0% Низкий | 2 месяца назад | |
SUSE-SU-2026:0827-1 Security update for glibc-livepatches | 0% Низкий | 24 дня назад | ||
SUSE-SU-2026:0499-1 Security update for glibc-livepatches | 0% Низкий | около 1 месяца назад | ||
SUSE-SU-2026:0347-1 Security update for glibc-livepatches | 0% Низкий | около 2 месяцев назад | ||
GHSA-5pf6-63v3-88hw Passing too large an alignment to the memalign suite of functions (memalign, posix_memalign, aligned_alloc, valloc, pvalloc) in the GNU C Library version 2.30 to 2.42 may result in an integer overflow, which could consequently result in a heap corruption. | CVSS3: 8.4 | 0% Низкий | 2 месяца назад | |
BDU:2026-00915 Уязвимость функций memalign(), posix_memalign(), aligned_alloc(), valloc(), pvalloc() системной библиотеки GNU C Library, позволяющая нарушителю выполнить произвольный код, вызвать отказ в обслуживании или раскрыть защищаемую информацию | CVSS3: 8.4 | 0% Низкий | 2 месяца назад | |
RLSA-2026:1334 Moderate: glibc security update | около 2 месяцев назад | |||
ELSA-2026-50078 ELSA-2026-50078: glibc security update (MODERATE) | около 2 месяцев назад | |||
ELSA-2026-1334 ELSA-2026-1334: glibc security update (MODERATE) | 2 месяца назад | |||
SUSE-SU-2026:0371-1 Security update for glibc | около 2 месяцев назад | |||
RLSA-2026:2786 Moderate: glibc security update | около 1 месяца назад | |||
ELSA-2026-50120 ELSA-2026-50120: glibc security update (MODERATE) | около 1 месяца назад | |||
ELSA-2026-2786 ELSA-2026-2786: glibc security update (MODERATE) | около 1 месяца назад | |||
openSUSE-SU-2026:20133-1 Security update for glibc | около 2 месяцев назад | |||
SUSE-SU-2026:0896-1 Security update for glibc | 16 дней назад |
Уязвимостей на страницу