7.8 CVE-2026-21385

Enriched by CISA
 

Memory corruption while using alignments for memory allocation.
https://nvd.nist.gov/vuln/detail/CVE-2026-21385

Categories

CWE-190 : Integer Overflow or Wraparound
The product performs a calculation that canproduce an integer overflow or wraparound when the logicassumes that the resulting value will always be larger thanthe original value. This occurs when an integer value isincremented to a value that is too large to store in theassociated representation. When this occurs, the value maybecome a very small or negative number. The terms "overflow" and "wraparound" areused interchangeably by some people, but they can havemore precise distinctions by others. See TerminologyNotes. The terms "overflow" and "wraparound" areused interchangeably by some people, but they can havemore precise distinctions by others. See TerminologyNotes. Alternate spellings of "wraparound" This weakness can often be detected using automated static analysis tools. Many modern tools use data flow analysis or constraint-based techniques to minimize the number of false positives. Sometimes, evidence of this weakness can be detected using dynamic tools and techniques that interact with the product using large test suites with many diverse inputs, such as fuzz testing (fuzzing), robustness testing, and fault injection. The product's operation may slow down, but it should not become unstable, crash, or generate incorrect results. Ensure that all protocols are strictly defined, such that all out-of-bounds behavior can be identified simply, and require strict conformance to the protocol. For any security checks that are performed on the client side, ensure that these checks are duplicated on the server side, in order to avoid CWE-602. Attackers can bypass the client-side checks by modifying values after the checks have been performed, or by changing the client to remove the client-side checks entirely. Then, these modified values would be submitted to the server. Examine compiler warnings closely and eliminate problems with potential security implications, such as signed / unsigned mismatch in memory operations, or use of uninitialized variables. Even if the weakness is rarely exploitable, a single failure may lead to the compromise of the entire system. Chain: Javascript engine code does not perform a length check (CWE-1284) leading to integer overflow (CWE-190) causing allocation of smaller buffer than expected (CWE-131) resulting in a heap-based buffer overflow (CWE-122) Font rendering library does not properlyhandle assigning a signed short value to an unsignedlong (CWE-195), leading to an integer wraparound(CWE-190), causing too small of a buffer (CWE-131),leading to an out-of-bounds write(CWE-787). Chain: in a web browser, an unsigned 64-bit integer is forcibly cast to a 32-bit integer (CWE-681) and potentially leading to an integer overflow (CWE-190). If an integer overflow occurs, this can cause heap memory corruption (CWE-122) Chain: Python library does not limit the resources used to process images that specify a very large number of bands (CWE-1284), leading to excessive memory consumption (CWE-789) or an integer overflow (CWE-190). Chain: 3D renderer has an integer overflow (CWE-190) leading to write-what-where condition (CWE-123) using a crafted image. Chain: improper input validation (CWE-20) leads to integer overflow (CWE-190) in mobile OS, as exploited in the wild per CISA KEV. Chain: improper input validation (CWE-20) leads to integer overflow (CWE-190) in mobile OS, as exploited in the wild per CISA KEV. Chain: unexpected sign extension (CWE-194) leads to integer overflow (CWE-190), causing an out-of-bounds read (CWE-125) Chain: compiler optimization (CWE-733) removes or modifies code used to detect integer overflow (CWE-190), allowing out-of-bounds write (CWE-787). Chain: integer overflow (CWE-190) causes a negative signed value, which later bypasses a maximum-only check (CWE-839), leading to heap-based buffer overflow (CWE-122). Chain: integer overflow leads to use-after-free Chain: integer overflow in securely-coded mail program leads to buffer overflow. In 2005, this was regarded as unrealistic to exploit, but in 2020, it was rediscovered to be easier to exploit due to evolutions of the technology. Integer overflow via a large number of arguments. Integer overflow in OpenSSH as listed in the demonstrative examples. Image with large width and height leads to integer overflow. Length value of -1 leads to allocation of 0 bytes and resultant heap overflow. Length value of -1 leads to allocation of 0 bytes and resultant heap overflow. chain: unchecked message size metadata allows integer overflow (CWE-190) leading to buffer overflow (CWE-119). Chain: an integer overflow (CWE-190) in the image size calculation causes an infinite loop (CWE-835) which sequentially allocates buffers without limits (CWE-1325) until the stack is full.

References


 

AFFECTED (from MITRE)


Vendor Product Versions
Qualcomm, Inc. Snapdragon
  • 5G Fixed Wireless Access Platform [affected]
  • APQ8098 [affected]
  • AR8031 [affected]
  • AR8035 [affected]
  • C-V2X 9150 [affected]
  • CSRA6620 [affected]
  • CSRA6640 [affected]
  • FastConnect 6200 [affected]
  • FastConnect 6700 [affected]
  • FastConnect 6800 [affected]
  • FastConnect 6900 [affected]
  • FastConnect 7800 [affected]
  • Flight RB5 5G Platform [affected]
  • FSM100 Platform [affected]
  • G1 Gen 1 [affected]
  • G2 Gen 1 [affected]
  • IQ6 Series Platform [affected]
  • IQ8 Series Platform [affected]
  • IQ9 Series Platform [affected]
  • LeMans_AU_LGIT [affected]
  • LeMansAU [affected]
  • MDM9250 [affected]
  • MDM9628 [affected]
  • Milos [affected]
  • Monaco_IOT [affected]
  • Netrani [affected]
  • Orne [affected]
  • Palawan25 [affected]
  • Pandeiro [affected]
  • QAM8255P [affected]
  • QAM8295P [affected]
  • QAMSRV1H [affected]
  • QAMSRV1M [affected]
  • QCA2066 [affected]
  • QCA6174A [affected]
  • QCA6391 [affected]
  • QCA6564A [affected]
  • QCA6564AU [affected]
  • QCA6574 [affected]
  • QCA6574A [affected]
  • QCA6574AU [affected]
  • QCA6584AU [affected]
  • QCA6595 [affected]
  • QCA6595AU [affected]
  • QCA6678AQ [affected]
  • QCA6688AQ [affected]
  • QCA6696 [affected]
  • QCA6698AQ [affected]
  • QCA6698AU [affected]
  • QCA6797AQ [affected]
  • QCA8081 [affected]
  • QCA8337 [affected]
  • QCA8695AU [affected]
  • QCA9367 [affected]
  • QCA9377 [affected]
  • QCM2290 [affected]
  • QCM4325 [affected]
  • QCM4490 [affected]
  • QCM5430 [affected]
  • QCM6125 [affected]
  • QCM6490 [affected]
  • QCN6024 [affected]
  • QCN9011 [affected]
  • QCN9012 [affected]
  • QCN9024 [affected]
  • QCS2290 [affected]
  • QCS4290 [affected]
  • QCS4490 [affected]
  • QCS8550 [affected]
  • QLN1083BD [affected]
  • QLN1086BD [affected]
  • QMP1000 [affected]
  • QPA1083BD [affected]
  • QPA1086BD [affected]
  • QRB5165M [affected]
  • QRB5165N [affected]
  • Qualcomm 215 Mobile Platform [affected]
  • Qualcomm Video Collaboration VC1 Platform [affected]
  • Qualcomm Video Collaboration VC3 Platform [affected]
  • Qualcomm Video Collaboration VC5 Platform [affected]
  • QXM1083 [affected]
  • QXM1086 [affected]
  • QXM1093 [affected]
  • QXM1094 [affected]
  • QXM1095 [affected]
  • QXM1096 [affected]
  • Robotics RB2 Platform [affected]
  • Robotics RB5 Platform [affected]
  • SA4150P [affected]
  • SA4155P [affected]
  • SA6145P [affected]
  • SA6150P [affected]
  • SA6155 [affected]
  • SA6155P [affected]
  • SA7255P [affected]
  • SA7775P [affected]
  • SA8145P [affected]
  • SA8150P [affected]
  • SA8155 [affected]
  • SA8155P [affected]
  • SA8195P [affected]
  • SA8255P [affected]
  • SA8295P [affected]
  • SA8620P [affected]
  • SA8770P [affected]
  • SA9000P [affected]
  • SAR1165P [affected]
  • SAR1250P [affected]
  • SAR2130P [affected]
  • SAR2230P [affected]
  • SC8380XP [affected]
  • SD 8 Gen1 5G [affected]
  • SD626 [affected]
  • SD662 [affected]
  • SD865 5G [affected]
  • SDA660 [affected]
  • SDM429W [affected]
  • SDX61 [affected]
  • SM6225P [affected]
  • SM6650P [affected]
  • SM7325P [affected]
  • SM7435 [affected]
  • SM7550 [affected]
  • SM7550P [affected]
  • SM7635P [affected]
  • SM7675 [affected]
  • SM7675P [affected]
  • SM8475P [affected]
  • SM8550P [affected]
  • SM8635 [affected]
  • SM8635P [affected]
  • SM8650Q [affected]
  • SM8750P [affected]
  • Smart Audio 400 Platform [affected]
  • Smart Display 200 Platform [affected]
  • Snapdragon 4 Gen 1 Mobile Platform [affected]
  • Snapdragon 4 Gen 2 Mobile Platform [affected]
  • Snapdragon 429 Mobile Platform [affected]
  • Snapdragon 460 Mobile Platform [affected]
  • Snapdragon 480 5G Mobile Platform [affected]
  • Snapdragon 480+ 5G Mobile Platform [affected]
  • Snapdragon 6 Gen 1 Mobile Platform [affected]
  • Snapdragon 6 Gen 3 Mobile Platform [affected]
  • Snapdragon 6 Gen 4 Mobile Platform [affected]
  • Snapdragon 625 Mobile Platform [affected]
  • Snapdragon 626 Mobile Platform [affected]
  • Snapdragon 660 Mobile Platform [affected]
  • Snapdragon 662 Mobile Platform [affected]
  • Snapdragon 680 4G Mobile Platform [affected]
  • Snapdragon 685 4G Mobile Platform [affected]
  • Snapdragon 690 5G Mobile Platform [affected]
  • Snapdragon 695 5G Mobile Platform [affected]
  • Snapdragon 7 Gen 1 Mobile Platform [affected]
  • Snapdragon 7+ Gen 2 Mobile Platform [affected]
  • Snapdragon 778G 5G Mobile Platform [affected]
  • Snapdragon 778G+ 5G Mobile Platform [affected]
  • Snapdragon 782G Mobile Platform [affected]
  • Snapdragon 7c+ Gen 3 Compute [affected]
  • Snapdragon 7s Gen 3 Mobile Platform [affected]
  • Snapdragon 8 Elite [affected]
  • Snapdragon 8 Elite Gen 5 [affected]
  • Snapdragon 8 Gen 1 Mobile Platform [affected]
  • Snapdragon 8 Gen 2 Mobile Platform [affected]
  • Snapdragon 8 Gen 3 Mobile Platform [affected]
  • Snapdragon 8+ Gen 1 Mobile Platform [affected]
  • Snapdragon 8+ Gen 2 Mobile Platform [affected]
  • Snapdragon 820 Automotive Platform [affected]
  • Snapdragon 820Am [affected]
  • Snapdragon 865 5G Mobile Platform [affected]
  • Snapdragon 865+ 5G Mobile Platform [affected]
  • Snapdragon 870 5G Mobile Platform [affected]
  • Snapdragon 888 5G Mobile Platform [affected]
  • Snapdragon 888+ 5G Mobile Platform [affected]
  • Snapdragon AR1 Gen 1 Platform [affected]
  • Snapdragon AR1+ Gen 1 Platform [affected]
  • Snapdragon Auto 5G Modem-RF [affected]
  • Snapdragon W5+ Gen 1 Wearable Platform [affected]
  • Snapdragon X12 LTE Modem [affected]
  • Snapdragon X5 LTE Modem [affected]
  • Snapdragon X53 5G Modem-RF System [affected]
  • Snapdragon X55 5G Modem-RF System [affected]
  • Snapdragon X65 5G Modem-RF System [affected]
  • Snapdragon XR2 5G Platform [affected]
  • Snapdragon XR2+ Gen 1 Platform [affected]
  • SRV1H [affected]
  • SRV1M [affected]
  • SW5100 [affected]
  • SW5100P [affected]
  • SW6100 [affected]
  • SW6100P [affected]
  • SXR2230P [affected]
  • SXR2250P [affected]
  • SXR2330P [affected]
  • SXR2350P [affected]
  • Themisto [affected]
  • Vision Intelligence 100 Platform [affected]
  • Vision Intelligence 200 Platform [affected]
  • Vision Intelligence 400 Platform [affected]
  • WCD9326 [affected]
  • WCD9330 [affected]
  • WCD9335 [affected]
  • WCD9341 [affected]
  • WCD9360 [affected]
  • WCD9370 [affected]
  • WCD9371 [affected]
  • WCD9375 [affected]
  • WCD9378 [affected]
  • WCD9380 [affected]
  • WCD9385 [affected]
  • WCD9390 [affected]
  • WCD9395 [affected]
  • WCN3615 [affected]
  • WCN3620 [affected]
  • WCN3660B [affected]
  • WCN3680B [affected]
  • WCN3910 [affected]
  • WCN3950 [affected]
  • WCN3980 [affected]
  • WCN3988 [affected]
  • WCN3990 [affected]
  • WCN6450 [affected]
  • WCN6650 [affected]
  • WCN6755 [affected]
  • WCN7860 [affected]
  • WCN7861 [affected]
  • WCN7880 [affected]
  • WCN7881 [affected]
  • WSA8810 [affected]
  • WSA8815 [affected]
  • WSA8830 [affected]
  • WSA8832 [affected]
  • WSA8835 [affected]
  • WSA8840 [affected]
  • WSA8845 [affected]
  • WSA8845H [affected]
© 2022 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.

CPE

cpe start end


REMEDIATION




EXPLOITS


Exploit-db.com

id description date
No known exploits

POC Github

Url
No known exploits

Other Nist (github, ...)

Url
No known exploits


CAPEC


Common Attack Pattern Enumerations and Classifications

id description severity
92 Forced Integer Overflow
High