CVE-2026-2644

A weakness has been identified in niklasso minisat up to 2.2.0. This issue affects the function Solver::value in the library core/SolverTypes.h of the component DIMACS File Parser. This manipulation of the argument variable index with the input 2147483648 causes out-of-bounds read. The attack needs to be launched locally. The exploit has been made available to the public and could be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.
References
Link Resource
https://github.com/niklasso/minisat/ Product Vendor Advisory
https://github.com/niklasso/minisat/issues/55 Exploit Issue Tracking Vendor Advisory
https://github.com/niklasso/minisat/issues/55#issue-3832527387 Exploit Issue Tracking
https://vuldb.com/?ctiid.346406 Permissions Required VDB Entry
https://vuldb.com/?id.346406 Third Party Advisory VDB Entry
https://vuldb.com/?submit.752775 Exploit Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:minisat:minisat:*:*:*:*:*:*:*:*

History

20 Feb 2026, 16:20

Type Values Removed Values Added
References () https://github.com/niklasso/minisat/ - () https://github.com/niklasso/minisat/ - Product, Vendor Advisory
References () https://github.com/niklasso/minisat/issues/55 - () https://github.com/niklasso/minisat/issues/55 - Exploit, Issue Tracking, Vendor Advisory
References () https://github.com/niklasso/minisat/issues/55#issue-3832527387 - () https://github.com/niklasso/minisat/issues/55#issue-3832527387 - Exploit, Issue Tracking
References () https://vuldb.com/?ctiid.346406 - () https://vuldb.com/?ctiid.346406 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.346406 - () https://vuldb.com/?id.346406 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.752775 - () https://vuldb.com/?submit.752775 - Exploit, Third Party Advisory, VDB Entry
First Time Minisat minisat
Minisat
Summary
  • (es) Se ha identificado una debilidad en niklasso minisat hasta 2.2.0. Este problema afecta a la función Solver::value en la biblioteca core/SolverTypes.h del componente DIMACS File Parser. Esta manipulación del índice de la variable del argumento con la entrada 2147483648 causa una lectura fuera de límites. El ataque debe ser lanzado localmente. El exploit se ha puesto a disposición del público y podría ser usado para ataques. El proyecto fue informado del problema tempranamente a través de un informe de problema pero no ha respondido aún.
CWE CWE-787
CPE cpe:2.3:a:minisat:minisat:*:*:*:*:*:*:*:*

18 Feb 2026, 07:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-18 07:16

Updated : 2026-02-20 16:20


NVD link : CVE-2026-2644

Mitre link : CVE-2026-2644

CVE.ORG link : CVE-2026-2644


JSON object : View

Products Affected

minisat

  • minisat
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-125

Out-of-bounds Read

CWE-787

Out-of-bounds Write