<reportApi _class='io.jenkins.plugins.analysis.core.restapi.ReportApi'><issue><addedAt>0</addedAt><authorEmail>-</authorEmail><authorName>-</authorName><baseName>govway</baseName><category></category><columnEnd>0</columnEnd><columnStart>0</columnStart><commit>-</commit><description></description><fileName>/linkitaly/govway</fileName><fingerprint>FALLBACK-461d9acf</fingerprint><lineEnd>1</lineEnd><lineStart>1</lineStart><message>CVE-2026-40200: OsPackageVulnerability

An issue was discovered in musl libc 0.7.10 through 1.2.6. Stack-based ...

For additional help see: **Vulnerability CVE-2026-40200**
| Severity | Package | Fixed Version | Link |
| --- | --- | --- | --- |
|UNKNOWN|musl-utils|1.2.5-r23|[CVE-2026-40200](https://avd.aquasec.com/nvd/cve-2026-40200)|

An issue was discovered in musl libc 0.7.10 through 1.2.6. Stack-based memory corruption can occur during qsort of very large arrays, due to incorrectly implemented double-word primitives. The number of elements must exceed about seven million, i.e., the 32nd Leonardo number on 32-bit platforms (or the 64th Leonardo number on 64-bit platforms, which is not practical).

Package: musl
Installed Version: 1.2.5-r21
Vulnerability CVE-2026-40200
Severity: UNKNOWN
Fixed Version: 1.2.5-r23
Link: [CVE-2026-40200](https://avd.aquasec.com/nvd/cve-2026-40200)</message><moduleName></moduleName><origin>trivy</origin><originName>Trivy Security Scanner</originName><packageName>-</packageName><reference>1398</reference><severity>LOW</severity><toString>govway(1,0): CVE-2026-40200: : CVE-2026-40200: OsPackageVulnerability

An issue was discovered in musl libc 0.7.10 through 1.2.6. Stack-based ...

For additional help see: **Vulnerability CVE-2026-40200**
| Severity | Package | Fixed Version | Link |
| --- | --- | --- | --- |
|UNKNOWN|musl-utils|1.2.5-r23|[CVE-2026-40200](https://avd.aquasec.com/nvd/cve-2026-40200)|

An issue was discovered in musl libc 0.7.10 through 1.2.6. Stack-based memory corruption can occur during qsort of very large arrays, due to incorrectly implemented double-word primitives. The number of elements must exceed about seven million, i.e., the 32nd Leonardo number on 32-bit platforms (or the 64th Leonardo number on 64-bit platforms, which is not practical).

Package: musl
Installed Version: 1.2.5-r21
Vulnerability CVE-2026-40200
Severity: UNKNOWN
Fixed Version: 1.2.5-r23
Link: [CVE-2026-40200](https://avd.aquasec.com/nvd/cve-2026-40200)</toString><type>CVE-2026-40200</type></issue><issue><addedAt>0</addedAt><authorEmail>-</authorEmail><authorName>-</authorName><baseName>govway</baseName><category></category><columnEnd>0</columnEnd><columnStart>0</columnStart><commit>-</commit><description></description><fileName>/linkitaly/govway</fileName><fingerprint>FALLBACK-461d9acf</fingerprint><lineEnd>1</lineEnd><lineStart>1</lineStart><message>CVE-2026-40200: OsPackageVulnerability

An issue was discovered in musl libc 0.7.10 through 1.2.6. Stack-based ...

For additional help see: **Vulnerability CVE-2026-40200**
| Severity | Package | Fixed Version | Link |
| --- | --- | --- | --- |
|UNKNOWN|musl-utils|1.2.5-r23|[CVE-2026-40200](https://avd.aquasec.com/nvd/cve-2026-40200)|

An issue was discovered in musl libc 0.7.10 through 1.2.6. Stack-based memory corruption can occur during qsort of very large arrays, due to incorrectly implemented double-word primitives. The number of elements must exceed about seven million, i.e., the 32nd Leonardo number on 32-bit platforms (or the 64th Leonardo number on 64-bit platforms, which is not practical).

Package: musl-utils
Installed Version: 1.2.5-r21
Vulnerability CVE-2026-40200
Severity: UNKNOWN
Fixed Version: 1.2.5-r23
Link: [CVE-2026-40200](https://avd.aquasec.com/nvd/cve-2026-40200)</message><moduleName></moduleName><origin>trivy</origin><originName>Trivy Security Scanner</originName><packageName>-</packageName><reference>1398</reference><severity>LOW</severity><toString>govway(1,0): CVE-2026-40200: : CVE-2026-40200: OsPackageVulnerability

An issue was discovered in musl libc 0.7.10 through 1.2.6. Stack-based ...

For additional help see: **Vulnerability CVE-2026-40200**
| Severity | Package | Fixed Version | Link |
| --- | --- | --- | --- |
|UNKNOWN|musl-utils|1.2.5-r23|[CVE-2026-40200](https://avd.aquasec.com/nvd/cve-2026-40200)|

An issue was discovered in musl libc 0.7.10 through 1.2.6. Stack-based memory corruption can occur during qsort of very large arrays, due to incorrectly implemented double-word primitives. The number of elements must exceed about seven million, i.e., the 32nd Leonardo number on 32-bit platforms (or the 64th Leonardo number on 64-bit platforms, which is not practical).

Package: musl-utils
Installed Version: 1.2.5-r21
Vulnerability CVE-2026-40200
Severity: UNKNOWN
Fixed Version: 1.2.5-r23
Link: [CVE-2026-40200](https://avd.aquasec.com/nvd/cve-2026-40200)</toString><type>CVE-2026-40200</type></issue><size>2</size><toString>2 warnings (low: 2)</toString></reportApi>