Search CVE reports
1 – 7 of 7 results
CVE-2020-28928
Medium prioritySome fixes available 4 of 7
In musl libc through 1.2.1, wcsnrtombs mishandles particular combinations of destination buffer size and source character limit, as demonstrated by an invalid write access (buffer overflow).
1 affected packages
musl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
musl | Not affected | Not affected | Fixed | Fixed | Fixed |
CVE-2014-3484
Medium prioritySome fixes available 1 of 2
Multiple stack-based buffer overflows in the __dn_expand function in network/dn_expand.c in musl libc 1.1x before 1.1.2 and 0.9.13 through 1.0.3 allow remote attackers to (1) have unspecified impact via an invalid name length in a...
1 affected packages
musl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
musl | — | — | — | Not affected | Not affected |
CVE-2019-14697
Medium prioritySome fixes available 3 of 4
musl libc through 1.1.23 has an x87 floating-point stack adjustment imbalance, related to the math/i386/ directory. In some cases, use of this library could introduce out-of-bounds writes that are not present in an application's...
1 affected packages
musl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
musl | — | Not affected | Not affected | Fixed | Fixed |
CVE-2018-1000001
High prioritySome fixes available 5 of 11
In glibc 2.26 and earlier there is confusion in the usage of getcwd() by realpath() which can be used to write before the destination buffer leading to a buffer underflow and potential code execution.
4 affected packages
dietlibc, eglibc, glibc, musl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
dietlibc | — | — | — | Not affected | Not affected |
eglibc | — | — | — | Not in release | Not in release |
glibc | — | — | — | Not affected | Fixed |
musl | — | — | — | Not affected | Fixed |
CVE-2017-15650
Medium prioritySome fixes available 1 of 3
musl libc before 1.1.17 has a buffer overflow via crafted DNS replies because dns_parse_callback in network/lookup_name.c does not restrict the number of addresses, and thus an attacker can provide an unexpected number by sending...
1 affected packages
musl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
musl | — | Not affected | Not affected | Not affected | Fixed |
CVE-2015-1817
Medium prioritySome fixes available 1 of 3
Stack-based buffer overflow in the inet_pton function in network/inet_pton.c in musl libc 0.9.15 through 1.0.4, and 1.1.0 through 1.1.7 allows attackers to have unspecified impact via unknown vectors.
1 affected packages
musl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
musl | — | — | — | Not affected | Not affected |
CVE-2016-8859
Medium prioritySome fixes available 4 of 11
Multiple integer overflows in the TRE library and musl libc allow attackers to cause memory corruption via a large number of (1) states or (2) tags, which triggers an out-of-bounds write.
2 affected packages
musl, tre
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
musl | — | Not affected | Not affected | Not affected | Fixed |
tre | — | Not affected | Not affected | Not affected | Fixed |