Musl-libc

Musl

6 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Published 14.02.2025 04:15:09
  • Last modified 14.02.2025 17:15:23

musl libc 0.9.13 through 1.2.5 before 1.2.6 has an out-of-bounds write vulnerability when an attacker can trigger iconv conversion of untrusted EUC-KR text to UTF-8.

  • EPSS 0.03%
  • Published 24.11.2020 18:15:12
  • Last modified 21.11.2024 05:23:18

In musl libc through 1.2.1, wcsnrtombs mishandles particular combinations of destination buffer size and source character limit, as demonstrated by an invalid write access (buffer overflow).

  • EPSS 1.79%
  • Published 20.02.2020 04:15:10
  • Last modified 21.11.2024 02:08:12

Multiple stack-based buffer overflows in the __dn_expand function in network/dn_expand.c in musl libc 1.1x before 1.1.2 and 0.9.13 through 1.0.3 allow remote attackers to (1) have unspecified impact via an invalid name length in a DNS response or (2)...

Exploit
  • EPSS 0.21%
  • Published 06.08.2019 16:15:11
  • Last modified 21.11.2024 04:27:09

musl libc through 1.1.23 has an x87 floating-point stack adjustment imbalance, related to the math/i386/ directory. In some cases, use of this library could introduce out-of-bounds writes that are not present in an application's source code.

  • EPSS 0.63%
  • Published 19.10.2017 23:29:00
  • Last modified 20.04.2025 01:37:25

musl libc before 1.1.17 has a buffer overflow via crafted DNS replies because dns_parse_callback in network/lookup_name.c does not restrict the number of addresses, and thus an attacker can provide an unexpected number by sending A records in a reply...

  • EPSS 0.45%
  • Published 18.08.2017 16:29:00
  • Last modified 20.04.2025 01:37:25

Stack-based buffer overflow in the inet_pton function in network/inet_pton.c in musl libc 0.9.15 through 1.0.4, and 1.1.0 through 1.1.7 allows attackers to have unspecified impact via unknown vectors.