First published: Mon Feb 13 2017(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/musl | 1.2.2-1 1.2.3-1 1.2.5-1.1 | |
debian/tre | 0.8.0-6 0.8.0-7 0.8.0-8 | |
musl | <=1.1.15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-8859 has a high severity level due to its potential to cause memory corruption.
To fix CVE-2016-8859, upgrade the TRE library or musl libc to versions that are not affected by this vulnerability.
CVE-2016-8859 affects musl versions up to and including 1.1.15.
Affected TRE versions include 0.8.0-6, 0.8.0-7, and 0.8.0-8.
CVE-2016-8859 can enable attacks that lead to memory corruption through integer overflow vulnerabilities.