musl libc before 1.1.17 has a buffer overflow via crafted DNS replies because dnsparsecallback in network/lookup_name.c does not restrict the number of addresses, and thus an attacker can provide an unexpected number by sending A records in a reply to an AAAA query.
{
"unresolved_ranges": [
{
"cpe": "cpe:2.3:a:musl-libc:musl:*:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "1.1.6"
}
]
},
{
"source": "DESCRIPTION",
"extracted_events": [
{
"fixed": "1.1.17"
}
]
}
]
}[
{
"id": "CVE-2017-15650-0c40b056",
"digest": {
"line_hashes": [
"19105209796768762262057181071667862774",
"337813073784692095994138226666901462849",
"55846828187015184318840200573767133364",
"76903974613516892053616754843570385638"
],
"threshold": 0.9
},
"signature_type": "Line",
"signature_version": "v1",
"deprecated": false,
"source": "http://git.musl-libc.org/git/musl@45ca5d3fcb6f874bf5ba55d0e9651cef68515395",
"target": {
"file": "src/network/lookup_name.c"
}
},
{
"id": "CVE-2017-15650-82c2c8f5",
"digest": {
"function_hash": "65063592785737742352495545225918919199",
"length": 789.0
},
"signature_type": "Function",
"signature_version": "v1",
"deprecated": false,
"source": "http://git.musl-libc.org/git/musl@45ca5d3fcb6f874bf5ba55d0e9651cef68515395",
"target": {
"function": "dns_parse_callback",
"file": "src/network/lookup_name.c"
}
}
]
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-15650.json"
"2026-05-07T00:05:45Z"