Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

Search CVE reports


Toggle filters

1 – 7 of 7 results


CVE-2020-28928

Medium priority

Some fixes available 4 of 7

In musl libc through 1.2.1, wcsnrtombs mishandles particular combinations of destination buffer size and source character limit, as demonstrated by an invalid write access (buffer overflow).

1 affected packages

musl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
musl Not affected Not affected Fixed Fixed Fixed
Show less packages

CVE-2014-3484

Medium priority

Some fixes available 1 of 2

Multiple stack-based buffer overflows in the __dn_expand function in network/dn_expand.c in musl libc 1.1x before 1.1.2 and 0.9.13 through 1.0.3 allow remote attackers to (1) have unspecified impact via an invalid name length in a...

1 affected packages

musl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
musl Not affected Not affected
Show less packages

CVE-2019-14697

Medium priority

Some fixes available 3 of 4

musl libc through 1.1.23 has an x87 floating-point stack adjustment imbalance, related to the math/i386/ directory. In some cases, use of this library could introduce out-of-bounds writes that are not present in an application's...

1 affected packages

musl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
musl Not affected Not affected Fixed Fixed
Show less packages

CVE-2018-1000001

High priority

Some fixes available 5 of 11

In glibc 2.26 and earlier there is confusion in the usage of getcwd() by realpath() which can be used to write before the destination buffer leading to a buffer underflow and potential code execution.

4 affected packages

dietlibc, eglibc, glibc, musl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
dietlibc Not affected Not affected
eglibc Not in release Not in release
glibc Not affected Fixed
musl Not affected Fixed
Show less packages

CVE-2017-15650

Medium priority

Some fixes available 1 of 3

musl libc before 1.1.17 has a buffer overflow via crafted DNS replies because dns_parse_callback in network/lookup_name.c does not restrict the number of addresses, and thus an attacker can provide an unexpected number by sending...

1 affected packages

musl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
musl Not affected Not affected Not affected Fixed
Show less packages

CVE-2015-1817

Medium priority

Some fixes available 1 of 3

Stack-based buffer overflow in the inet_pton function in network/inet_pton.c in musl libc 0.9.15 through 1.0.4, and 1.1.0 through 1.1.7 allows attackers to have unspecified impact via unknown vectors.

1 affected packages

musl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
musl Not affected Not affected
Show less packages

CVE-2016-8859

Medium priority

Some fixes available 4 of 11

Multiple integer overflows in the TRE library and musl libc allow attackers to cause memory corruption via a large number of (1) states or (2) tags, which triggers an out-of-bounds write.

2 affected packages

musl, tre

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
musl Not affected Not affected Not affected Fixed
tre Not affected Not affected Not affected Fixed
Show less packages