Calling the scanf family of functions with a %mc (malloc'd character match) in the GNU C Library version 2.7 to version 2.43 with a format width specifier with an explicit width greater than 1024 could result in a one byte heap buffer overflow.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 20 Apr 2026 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
The Gnu C Library
The Gnu C Library glibc |
|
| Vendors & Products |
The Gnu C Library
The Gnu C Library glibc |
Mon, 20 Apr 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Calling the scanf family of functions with a %mc (malloc'd character match) in the GNU C Library version 2.7 to version 2.43 with a format width specifier with an explicit width greater than 1024 could result in a one byte heap buffer overflow. | |
| Title | scanf %mc off-by-one heap buffer overflow | |
| Weaknesses | CWE-122 | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: glibc
Published:
Updated: 2026-04-20T20:55:41.170Z
Reserved: 2026-04-02T21:47:21.403Z
Link: CVE-2026-5450
No data.
Status : Received
Published: 2026-04-20T21:16:36.850
Modified: 2026-04-20T21:16:36.850
Link: CVE-2026-5450
No data.
OpenCVE Enrichment
Updated: 2026-04-21T00:00:13Z
Weaknesses