musl-libc musl 1.1.5

CPE Details

musl-libc musl 1.1.5
1.1.5
2019-09-18
14h52 +00:00
2019-09-18
14h52 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:musl-libc:musl:1.1.5:*:*:*:*:*:*:*

Informations

Vendor

musl-libc

Product

musl

Version

1.1.5

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2020-28928 2020-11-24 17h01 +00:00 In musl libc through 1.2.1, wcsnrtombs mishandles particular combinations of destination buffer size and source character limit, as demonstrated by an invalid write access (buffer overflow).
5.5
Medium
CVE-2017-15650 2017-10-19 21h00 +00:00 musl libc before 1.1.17 has a buffer overflow via crafted DNS replies because dns_parse_callback in network/lookup_name.c does not restrict the number of addresses, and thus an attacker can provide an unexpected number by sending A records in a reply to an AAAA query.
7.5
High
CVE-2015-1817 2017-08-18 14h00 +00:00 Stack-based buffer overflow in the inet_pton function in network/inet_pton.c in musl libc 0.9.15 through 1.0.4, and 1.1.0 through 1.1.7 allows attackers to have unspecified impact via unknown vectors.
9.8
Critical