UBUNTU-CVE-2026-2659

Source
https://ubuntu.com/security/CVE-2026-2659
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-2659.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2026-2659
Upstream
Published
2026-02-18T18:24:00Z
Modified
2026-02-27T09:58:15Z
Severity
  • 3.3 (Low) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L CVSS Calculator
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
  • 1.9 (Low) CVSS_V4 - CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

A vulnerability was determined in Squirrel up to 3.2. Affected by this vulnerability is the function SQFuncState::PopTarget of the file src/squirrel/squirrel/sqfuncstate.cpp. Executing a manipulation of the argument targetstack can lead to out-of-bounds read. It is possible to launch the attack on the local host. The exploit has been publicly disclosed and may be utilized. The project was informed of the problem early through an issue report but has not responded yet.

References

Affected packages

Ubuntu:18.04:LTS / squirrel3

Package

Name
squirrel3
Purl
pkg:deb/ubuntu/squirrel3@3.1-5?arch=source&distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*
3.1-4
3.1-5

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "3.1-5",
            "binary_name": "libsquirrel-dev"
        },
        {
            "binary_version": "3.1-5",
            "binary_name": "libsquirrel3-0"
        },
        {
            "binary_version": "3.1-5",
            "binary_name": "squirrel3"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-2659.json"

Ubuntu:20.04:LTS / squirrel3

Package

Name
squirrel3
Purl
pkg:deb/ubuntu/squirrel3@3.1-8build1?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*
3.1-8
3.1-8build1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "3.1-8build1",
            "binary_name": "libsquirrel-dev"
        },
        {
            "binary_version": "3.1-8build1",
            "binary_name": "libsquirrel3-0"
        },
        {
            "binary_version": "3.1-8build1",
            "binary_name": "squirrel3"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-2659.json"

Ubuntu:22.04:LTS / squirrel3

Package

Name
squirrel3
Purl
pkg:deb/ubuntu/squirrel3@3.1-8build1?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*
3.1-8build1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "3.1-8build1",
            "binary_name": "libsquirrel-dev"
        },
        {
            "binary_version": "3.1-8build1",
            "binary_name": "libsquirrel3-0"
        },
        {
            "binary_version": "3.1-8build1",
            "binary_name": "squirrel3"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-2659.json"

Ubuntu:25.10 / squirrel3

Package

Name
squirrel3
Purl
pkg:deb/ubuntu/squirrel3@3.1-8.2?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*
3.1-8.2

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "3.1-8.2",
            "binary_name": "libsquirrel-dev"
        },
        {
            "binary_version": "3.1-8.2",
            "binary_name": "libsquirrel3-0"
        },
        {
            "binary_version": "3.1-8.2",
            "binary_name": "squirrel3"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-2659.json"