Vulnerability Description
musl libc through 1.1.23 has an x87 floating-point stack adjustment imbalance, related to the math/i386/ directory. In some cases, use of this library could introduce out-of-bounds writes that are not present in an application's source code.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Musl-Libc | Musl | >= 0.9.12, <= 1.1.23 |
Related Weaknesses (CWE)
References
- http://www.openwall.com/lists/oss-security/2019/08/06/4ExploitMailing ListPatch
- https://security.gentoo.org/glsa/202003-13Third Party Advisory
- https://www.openwall.com/lists/musl/2019/08/06/1ExploitMailing ListPatch
- http://www.openwall.com/lists/oss-security/2019/08/06/4ExploitMailing ListPatch
- https://security.gentoo.org/glsa/202003-13Third Party Advisory
- https://www.openwall.com/lists/musl/2019/08/06/1ExploitMailing ListPatch
FAQ
What is CVE-2019-14697?
CVE-2019-14697 is a vulnerability with a CVSS score of 9.8 (CRITICAL). musl libc through 1.1.23 has an x87 floating-point stack adjustment imbalance, related to the math/i386/ directory. In some cases, use of this library could introduce out-of-bounds writes that are not...
How severe is CVE-2019-14697?
CVE-2019-14697 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2019-14697?
Check the references section above for vendor advisories and patch information. Affected products include: Musl-Libc Musl.