Debian Package Tracker
Register | Log in
Subscribe

musl

standard C library

Choose email to subscribe with

general
  • source: musl (main)
  • version: 1.2.1-1
  • maintainer: Reiner Herrmann (DMD) (DM)
  • arch: amd64 arm64 armel armhf i386 m68k mips mips64el mipsel ppc64el s390x sh4
  • std-ver: 4.5.0
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 1.1.5-2+deb8u1
  • oldstable: 1.1.16-3
  • old-sec: 1.1.16-3+deb9u1
  • stable: 1.1.21-2
  • testing: 1.2.1-1
  • unstable: 1.2.1-1
versioned links
  • 1.1.5-2+deb8u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.1.16-3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.1.16-3+deb9u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.1.21-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.2.1-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • musl
  • musl-dev (2 bugs: 0, 1, 1, 0)
  • musl-tools (1 bugs: 0, 1, 0, 0)
action needed
The VCS repository is not up to date, push the missing commits. high
vcswatch reports that this package has been uploaded into the archive but the debian/changelog in the VCS is still UNRELEASED. You should consider pushing the missing commits or updating the VCS.
Created: 2021-01-15 Last update: 2021-01-15 22:07
1 security issue in sid high
There is 1 open security issue in sid.
1 important issue:
  • CVE-2020-28928: In musl libc through 1.2.1, wcsnrtombs mishandles particular combinations of destination buffer size and source character limit, as demonstrated by an invalid write access (buffer overflow).
Please fix it.
Created: 2020-11-21 Last update: 2020-12-01 01:00
1 security issue in bullseye high
There is 1 open security issue in bullseye.
1 important issue:
  • CVE-2020-28928: In musl libc through 1.2.1, wcsnrtombs mishandles particular combinations of destination buffer size and source character limit, as demonstrated by an invalid write access (buffer overflow).
Please fix it.
Created: 2020-11-21 Last update: 2020-12-01 01:00
Depends on packages which need a new maintainer normal
The packages that musl depends on which need a new maintainer are:
  • dh-exec (#851746)
    • Build-Depends: dh-exec
Created: 2019-11-22 Last update: 2021-01-15 22:06
2 ignored security issues in stretch low
There are 2 open security issues in stretch.
2 issues skipped by the security teams:
  • CVE-2017-15650: musl libc before 1.1.17 has a buffer overflow via crafted DNS replies because dns_parse_callback in network/lookup_name.c does not restrict the number of addresses, and thus an attacker can provide an unexpected number by sending A records in a reply to an AAAA query.
  • CVE-2019-14697: musl libc through 1.1.23 has an x87 floating-point stack adjustment imbalance, related to the math/i386/ directory. In some cases, use of this library could introduce out-of-bounds writes that are not present in an application's source code.
Please fix them.
Created: 2017-10-20 Last update: 2020-12-01 01:00
2 ignored security issues in buster low
There are 2 open security issues in buster.
2 issues skipped by the security teams:
  • CVE-2019-14697: musl libc through 1.1.23 has an x87 floating-point stack adjustment imbalance, related to the math/i386/ directory. In some cases, use of this library could introduce out-of-bounds writes that are not present in an application's source code.
  • CVE-2020-28928: In musl libc through 1.2.1, wcsnrtombs mishandles particular combinations of destination buffer size and source character limit, as demonstrated by an invalid write access (buffer overflow).
Please fix them.
Created: 2019-08-06 Last update: 2020-12-01 01:00
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.5.1 instead of 4.5.0).
Created: 2020-11-17 Last update: 2020-11-17 05:41
testing migrations
  • excuses:
    • Migration status for musl (1.2.1-1 to 1.2.2-1): BLOCKED: Maybe temporary, maybe blocked but Britney is missing information (check below)
    • Issues preventing migration:
    • missing build on mips64el
    • missing build on mipsel
    • autopkgtest for musl: amd64: Test in progress, arm64: Test in progress, armhf: Test in progress, i386: Test in progress, ppc64el: Test in progress
    • Too young, only 0 of 5 days old
    • Additional info:
    • Piuparts tested OK - https://piuparts.debian.org/sid/source/m/musl.html
    • Not considered
news
[rss feed]
  • [2021-01-15] Accepted musl 1.2.2-1 (source) into unstable (Reiner Herrmann)
  • [2020-11-30] Accepted musl 1.1.16-3+deb9u1 (source amd64) into oldstable (Utkarsh Gupta)
  • [2020-08-07] musl 1.2.1-1 MIGRATED to testing (Debian testing watch)
  • [2020-08-04] Accepted musl 1.2.1-1 (source) into unstable (Reiner Herrmann)
  • [2020-07-06] musl 1.2.0-1 MIGRATED to testing (Debian testing watch)
  • [2020-07-03] Accepted musl 1.2.0-1 (source) into unstable (Reiner Herrmann)
  • [2019-10-16] musl 1.1.24-1 MIGRATED to testing (Debian testing watch)
  • [2019-10-13] Accepted musl 1.1.24-1 (source) into unstable (Reiner Herrmann)
  • [2019-08-09] musl 1.1.23-2 MIGRATED to testing (Debian testing watch)
  • [2019-08-06] Accepted musl 1.1.23-2 (source) into unstable (Reiner Herrmann)
  • [2019-07-20] musl 1.1.23-1 MIGRATED to testing (Debian testing watch)
  • [2019-07-17] Accepted musl 1.1.23-1 (source) into unstable (Reiner Herrmann)
  • [2019-04-11] Accepted musl 1.1.22-1 (source) into experimental (Reiner Herrmann)
  • [2019-01-26] musl 1.1.21-2 MIGRATED to testing (Debian testing watch)
  • [2019-01-23] Accepted musl 1.1.21-2 (source) into unstable (Reiner Herrmann)
  • [2019-01-22] Accepted musl 1.1.21-1 (source) into unstable (Reiner Herrmann)
  • [2018-09-07] musl 1.1.20-1 MIGRATED to testing (Debian testing watch)
  • [2018-09-04] Accepted musl 1.1.20-1 (source) into unstable (Reiner Herrmann)
  • [2018-07-22] musl 1.1.19-2 MIGRATED to testing (Debian testing watch)
  • [2018-07-19] Accepted musl 1.1.19-2 (source) into unstable (Reiner Herrmann)
  • [2018-03-03] musl 1.1.19-1 MIGRATED to testing (Debian testing watch)
  • [2018-02-25] Accepted musl 1.1.19-1 (source) into unstable (Reiner Herrmann)
  • [2017-11-06] musl 1.1.18-1 MIGRATED to testing (Debian testing watch)
  • [2017-10-31] Accepted musl 1.1.18-1 (source) into unstable (Reiner Herrmann)
  • [2017-10-23] musl 1.1.17-2 MIGRATED to testing (Debian testing watch)
  • [2017-10-20] Accepted musl 1.1.17-2 (source) into unstable (Reiner Herrmann)
  • [2017-10-19] Accepted musl 1.1.17-1 (source) into unstable (Reiner Herrmann)
  • [2017-03-12] musl 1.1.16-3 MIGRATED to testing (Debian testing watch)
  • [2017-03-09] Accepted musl 1.1.16-3 (source) into unstable (Reiner Herrmann)
  • [2017-02-02] musl 1.1.16-2 MIGRATED to testing (Debian testing watch)
  • 1
  • 2
bugs [bug history graph]
  • all: 3
  • RC: 0
  • I&N: 2
  • M&W: 1
  • F&P: 0
  • patch: 0
links
  • homepage
  • buildd: logs, clang, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 1.2.1-1

Debian Package Tracker — Copyright 2013-2018 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing