Home

Description

A vulnerability was detected in rui314 mold up to 2.40.4. This issue affects the function mold::ObjectFilemold::X86_64::initialize_sections of the file src/input-files.cc of the component Object File Handler. Performing a manipulation results in heap-based buffer overflow. Attacking locally is a requirement. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.

PUBLISHED Reserved 2026-03-11 | Published 2026-03-12 | Updated 2026-03-12 | Assigner VulDB




MEDIUM: 4.8CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
MEDIUM: 5.3CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
MEDIUM: 5.3CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
4.3AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR

Problem types

Heap-based Buffer Overflow

Memory Corruption

Product status

2.40.0
affected

2.40.1
affected

2.40.2
affected

2.40.3
affected

2.40.4
affected

Timeline

2026-03-11:Advisory disclosed
2026-03-11:VulDB entry created
2026-03-11:VulDB entry last update

Credits

Oneafter (VulDB User) reporter

References

vuldb.com/?id.350476 (VDB-350476 | rui314 mold Object File input-files.cc initialize_sections heap-based overflow) vdb-entry technical-description

vuldb.com/?ctiid.350476 (VDB-350476 | CTI Indicators (IOB, IOC, IOA)) signature permissions-required

vuldb.com/?submit.769772 (Submit #769772 | rui314 mold mold 2.40.4 and main-branch Heap-based Buffer Overflow) third-party-advisory

github.com/rui314/mold/issues/1548 issue-tracking

github.com/oneafter/0209/blob/main/mo2/repro exploit

github.com/rui314/mold/ product

cve.org (CVE-2026-3994)

nvd.nist.gov (CVE-2026-3994)

Download JSON