Musl-libc Musl 0.9.13 on X86

CPE Details

Musl-libc Musl 0.9.13 on X86
0.9.13
2019-08-23
16h36 +00:00
2021-05-17
16h18 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:musl-libc:musl:0.9.13:*:*:*:*:*:x86:*

Informations

Vendor

musl-libc

Product

musl

Version

0.9.13

Target Hardware

x86

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2020-28928 2020-11-24 17h01 +00:00 In musl libc through 1.2.1, wcsnrtombs mishandles particular combinations of destination buffer size and source character limit, as demonstrated by an invalid write access (buffer overflow).
5.5
Medium
CVE-2014-3484 2020-02-20 02h37 +00:00 Multiple stack-based buffer overflows in the __dn_expand function in network/dn_expand.c in musl libc 1.1x before 1.1.2 and 0.9.13 through 1.0.3 allow remote attackers to (1) have unspecified impact via an invalid name length in a DNS response or (2) cause a denial of service (crash) via an invalid name length in a DNS response, related to an infinite loop with no output.
9.8
Critical
CVE-2019-14697 2019-08-06 13h34 +00:00 musl libc through 1.1.23 has an x87 floating-point stack adjustment imbalance, related to the math/i386/ directory. In some cases, use of this library could introduce out-of-bounds writes that are not present in an application's source code.
9.8
Critical
CVE-2017-15650 2017-10-19 21h00 +00:00 musl libc before 1.1.17 has a buffer overflow via crafted DNS replies because dns_parse_callback in network/lookup_name.c does not restrict the number of addresses, and thus an attacker can provide an unexpected number by sending A records in a reply to an AAAA query.
7.5
High