A stack-use-after-return issue exists in the Arduino_Core_STM32 library prior to version 1.7.0. The pwm_start() function allocates a TIM_HandleTypeDef structure on the stack and passes its address to HAL initialization routines, where it is stored in a global timer handle registry. After the function returns, interrupt service routines may dereference this dangling pointer, resulting in memory corruption.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 22 Apr 2026 09:15:00 +0000

Type Values Removed Values Added
Title Stack‑Use‑After‑Return in Arduino_Core_STM32 Causes Memory Corruption

Wed, 22 Apr 2026 07:45:00 +0000

Type Values Removed Values Added
Title Stack Use-After-Return in Arduino STM32 Core Library Causing Memory Corruption
Weaknesses CWE-416

Wed, 22 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-825
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 20 Apr 2026 19:00:00 +0000

Type Values Removed Values Added
Title Stack Use-After-Return in Arduino STM32 Core Library Causing Memory Corruption
Weaknesses CWE-416

Mon, 20 Apr 2026 17:45:00 +0000

Type Values Removed Values Added
Description A stack-use-after-return issue exists in the Arduino_Core_STM32 library prior to version 1.7.0. The pwm_start() function allocates a TIM_HandleTypeDef structure on the stack and passes its address to HAL initialization routines, where it is stored in a global timer handle registry. After the function returns, interrupt service routines may dereference this dangling pointer, resulting in memory corruption.
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-21T19:50:16.102Z

Reserved: 2026-02-16T00:00:00.000Z

Link: CVE-2026-26399

cve-icon Vulnrichment

Updated: 2026-04-21T19:50:07.094Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-20T18:16:25.040

Modified: 2026-04-21T20:16:34.813

Link: CVE-2026-26399

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T09:00:09Z

Weaknesses