
CVE-2025-26519
https://notcve.org/view.php?id=CVE-2025-26519
14 Feb 2025 — musl libc 0.9.13 through 1.2.5 before 1.2.6 has an out-of-bounds write vulnerability when an attacker can trigger iconv conversion of untrusted EUC-KR text to UTF-8. • https://git.musl-libc.org/cgit/musl/commit/?id=c47ad25ea3b484e10326f933e927c0bc8cded3da • CWE-787: Out-of-bounds Write •

CVE-2020-28928 – Ubuntu Security Notice USN-5990-1
https://notcve.org/view.php?id=CVE-2020-28928
24 Nov 2020 — In musl libc through 1.2.1, wcsnrtombs mishandles particular combinations of destination buffer size and source character limit, as demonstrated by an invalid write access (buffer overflow). En musl libc versiones hasta 1.2.1, wcsnrtombs maneja inapropiadamente combinaciones particulares de tamaño de búfer de destino y límite de caracteres de origen, como es demostrado por un acceso de escritura no válido (desbordamiento de búfer) It was discovered that musl did not handle certain i386 math functions proper... • http://www.openwall.com/lists/oss-security/2020/11/20/4 • CWE-787: Out-of-bounds Write •

CVE-2014-3484
https://notcve.org/view.php?id=CVE-2014-3484
20 Feb 2020 — Multiple stack-based buffer overflows in the __dn_expand function in network/dn_expand.c in musl libc 1.1x before 1.1.2 and 0.9.13 through 1.0.3 allow remote attackers to (1) have unspecified impact via an invalid name length in a DNS response or (2) cause a denial of service (crash) via an invalid name length in a DNS response, related to an infinite loop with no output. Múltiples desbordamientos de búfer en la región stack de la memoria en la función __dn_expand en el archivo network/dn_expand.c en musl l... • http://git.musl-libc.org/cgit/musl/commit/?id=b3d9e0b94ea73c68ef4169ec82c898ce59a4e30a • CWE-787: Out-of-bounds Write •

CVE-2019-14697 – Ubuntu Security Notice USN-5990-1
https://notcve.org/view.php?id=CVE-2019-14697
06 Aug 2019 — musl libc through 1.1.23 has an x87 floating-point stack adjustment imbalance, related to the math/i386/ directory. In some cases, use of this library could introduce out-of-bounds writes that are not present in an application's source code. libc de musl hasta versión 1.1.23, presenta un desbalance de ajuste de pila del punto flotante x87, relacionado con el directorio math/i386/. En algunos casos, el uso de esta biblioteca podría introducir escrituras fuera de límites que no están presentes en un código fu... • http://www.openwall.com/lists/oss-security/2019/08/06/4 • CWE-787: Out-of-bounds Write •

CVE-2017-15650
https://notcve.org/view.php?id=CVE-2017-15650
19 Oct 2017 — musl libc before 1.1.17 has a buffer overflow via crafted DNS replies because dns_parse_callback in network/lookup_name.c does not restrict the number of addresses, and thus an attacker can provide an unexpected number by sending A records in a reply to an AAAA query. musl libc, en versiones anteriores a la 1.1.17, tiene un desbordamiento de búfer mediante respuestas DNS manipuladas, debido a que dns_parse_callback en network/lookup_name.c no restringe el número de direcciones y, por lo tanto, un atacante p... • http://git.musl-libc.org/cgit/musl/commit/?id=45ca5d3fcb6f874bf5ba55d0e9651cef68515395 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2015-1817
https://notcve.org/view.php?id=CVE-2015-1817
18 Aug 2017 — Stack-based buffer overflow in the inet_pton function in network/inet_pton.c in musl libc 0.9.15 through 1.0.4, and 1.1.0 through 1.1.7 allows attackers to have unspecified impact via unknown vectors. Un desbordamiento de pila en la función inet_pton en network/inet_pton.c en musl libc 0.9.15 en su versión 1.0.4 y 1.1.0 en su versión 1.1.7 permite que los atacantes tengan un impacto sin especificar mediante vectores desconocidos. • http://www.openwall.com/lists/oss-security/2015/03/30/3 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2016-8859 – Gentoo Linux Security Advisory 202007-43
https://notcve.org/view.php?id=CVE-2016-8859
02 Jan 2017 — Multiple integer overflows in the TRE library and musl libc allow attackers to cause memory corruption via a large number of (1) states or (2) tags, which triggers an out-of-bounds write. Múltiples desbordamientos de enteros en la librería TRE y musl libc permiten a atacantes provocar corrupción de memoria a través de un gran número de (1) estados o (2) etiquetas, lo que desencadena una escritura fuera de límites. Multiple vulnerabilities have been found in TRE, the worst of which could result in the arbitr... • http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html • CWE-190: Integer Overflow or Wraparound •

CVE-2012-2114
https://notcve.org/view.php?id=CVE-2012-2114
31 Aug 2012 — Stack-based buffer overflow in fprintf in musl before 0.8.8 and earlier allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string to an unbuffered stream such as stderr. Desbordamiento de búfer basado en pila en fprintf de musl anteriores a v0.8.8 permite a atacantes dependientes del contexto provocar una denegación del servicio (caída de la aplicación) o probablmente ejecutar código de su elección mediante una cadena de caracteres larga en ... • http://www.etalabs.net/musl/download.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •