musl libc through 1.1.23 has an x87 floating-point stack adjustment imbalance, related to the math/i386/ directory. In some cases, use of this library could introduce out-of-bounds writes that are not present in an application's source code.
References
| Link | Resource |
|---|---|
| http://www.openwall.com/lists/oss-security/2019/08/06/4 | Exploit Mailing List Patch Third Party Advisory |
| https://security.gentoo.org/glsa/202003-13 | Third Party Advisory |
| https://www.openwall.com/lists/musl/2019/08/06/1 | Exploit Mailing List Patch Third Party Advisory |
| http://www.openwall.com/lists/oss-security/2019/08/06/4 | Exploit Mailing List Patch Third Party Advisory |
| https://security.gentoo.org/glsa/202003-13 | Third Party Advisory |
| https://www.openwall.com/lists/musl/2019/08/06/1 | Exploit Mailing List Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 04:27
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://www.openwall.com/lists/oss-security/2019/08/06/4 - Exploit, Mailing List, Patch, Third Party Advisory | |
| References | () https://security.gentoo.org/glsa/202003-13 - Third Party Advisory | |
| References | () https://www.openwall.com/lists/musl/2019/08/06/1 - Exploit, Mailing List, Patch, Third Party Advisory |
03 Mar 2023, 17:43
| Type | Values Removed | Values Added |
|---|---|---|
| References | (GENTOO) https://security.gentoo.org/glsa/202003-13 - Third Party Advisory |
Information
Published : 2019-08-06 16:15
Updated : 2024-11-21 04:27
NVD link : CVE-2019-14697
Mitre link : CVE-2019-14697
CVE.ORG link : CVE-2019-14697
JSON object : View
Products Affected
musl-libc
- musl
CWE
CWE-787
Out-of-bounds Write
