Multiple stack-based buffer overflows in the _dnexpand function in network/dn_expand.c in musl libc 1.1x before 1.1.2 and 0.9.13 through 1.0.3 allow remote attackers to (1) have unspecified impact via an invalid name length in a DNS response or (2) cause a denial of service (crash) via an invalid name length in a DNS response, related to an infinite loop with no output.
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "0.9.15-1ubuntu0.1~esm1", "binary_name": "musl" }, { "binary_version": "0.9.15-1ubuntu0.1~esm1", "binary_name": "musl-dev" }, { "binary_version": "0.9.15-1ubuntu0.1~esm1", "binary_name": "musl-tools" } ] }