Bug 2430079

Summary: CVE-2026-0861 zig: Integer overflow in memalign leads to heap corruption [fedora-43]
Product: [Fedora] Fedora Reporter: Guilherme de Almeida Suckevicz <gsuckevi>
Component: zigAssignee: Jan Drögehoff <sentrycraft123>
Status: CLOSED WONTFIX QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: 43CC: baltevl, purin21345, sentrycraft123, suraj.ghimire7
Target Milestone: ---Keywords: Security, SecurityTracking
Target Release: ---   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard: {"flaws": ["f06d781b-0779-4f8a-96b8-0738713751d4"]}
Fixed In Version: Doc Type: ---
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2026-03-24 17:45:07 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 2429771    

Description Guilherme de Almeida Suckevicz 2026-01-15 17:50:16 UTC
Disclaimer: Community trackers are created by Red Hat Product Security team on a best effort basis. Package maintainers are required to ascertain if the flaw indeed affects their package, before starting the update process.

Comment 1 Jan Drögehoff 2026-01-22 09:12:16 UTC
Zig does not vendor glibc source code however it does make use of `posix_memalign` and can be made to pass an alignment of `1 << 63` to glibc.
Its been reported to upstream though I see it unlikely to be a major vulnerability to any zig program.

Comment 2 Jan Drögehoff 2026-01-22 09:19:23 UTC
*** Bug 2430077 has been marked as a duplicate of this bug. ***

Comment 3 Jan Drögehoff 2026-01-22 09:19:24 UTC
*** Bug 2430075 has been marked as a duplicate of this bug. ***

Comment 4 Jan Drögehoff 2026-01-22 09:19:25 UTC
*** Bug 2430074 has been marked as a duplicate of this bug. ***

Comment 5 Jan Drögehoff 2026-03-24 17:45:07 UTC
Upstream considers this issue to be neglible for them and only exploitable through misuse of the standard library.