Search for packages
purl | pkg:deb/ubuntu/musl@0.9.15-1 |
Next non-vulnerable version | 1.1.23-2build1 |
Latest non-vulnerable version | 1.1.23-2build1 |
Risk | 10.0 |
Vulnerability | Summary | Fixed by |
---|---|---|
VCID-gpw2-43be-aaag
Aliases: CVE-2016-8859 |
Multiple integer overflows in the TRE library and musl libc allow attackers to cause memory corruption via a large number of (1) states or (2) tags, which triggers an out-of-bounds write. |
Affected by 1 other vulnerability. |
VCID-h95e-6eu5-aaak
Aliases: CVE-2015-1817 |
Stack-based buffer overflow in the inet_pton function in network/inet_pton.c in musl libc 0.9.15 through 1.0.4, and 1.1.0 through 1.1.7 allows attackers to have unspecified impact via unknown vectors. |
Affected by 4 other vulnerabilities. |
VCID-kppj-ay2n-aaap
Aliases: CVE-2019-14697 |
musl libc through 1.1.23 has an x87 floating-point stack adjustment imbalance, related to the math/i386/ directory. In some cases, use of this library could introduce out-of-bounds writes that are not present in an application's source code. |
Affected by 0 other vulnerabilities. |
VCID-p2yk-65cw-aaap
Aliases: CVE-2014-3484 |
Multiple stack-based buffer overflows in the __dn_expand function in network/dn_expand.c in musl libc 1.1x before 1.1.2 and 0.9.13 through 1.0.3 allow remote attackers to (1) have unspecified impact via an invalid name length in a DNS response or (2) cause a denial of service (crash) via an invalid name length in a DNS response, related to an infinite loop with no output. |
Affected by 5 other vulnerabilities. |
VCID-svkm-2b47-aaaq
Aliases: CVE-2017-15650 |
musl libc before 1.1.17 has a buffer overflow via crafted DNS replies because dns_parse_callback in network/lookup_name.c does not restrict the number of addresses, and thus an attacker can provide an unexpected number by sending A records in a reply to an AAAA query. |
Affected by 2 other vulnerabilities. |
VCID-z25y-bsee-aaac
Aliases: CVE-2018-1000001 |
In glibc 2.26 and earlier there is confusion in the usage of getcwd() by realpath() which can be used to write before the destination buffer leading to a buffer underflow and potential code execution. |
Affected by 2 other vulnerabilities. |
Vulnerability | Summary | Aliases |
---|---|---|
This package is not known to fix vulnerabilities. |
Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
---|