Multiple stack-based buffer overflows in the _dnexpand function in network/dn_expand.c in musl libc 1.1x before 1.1.2 and 0.9.13 through 1.0.3 allow remote attackers to (1) have unspecified impact via an invalid name length in a DNS response or (2) cause a denial of service (crash) via an invalid name length in a DNS response, related to an infinite loop with no output.
{
"binaries": [
{
"binary_name": "musl",
"binary_version": "0.9.15-1ubuntu0.1~esm1"
},
{
"binary_name": "musl-dev",
"binary_version": "0.9.15-1ubuntu0.1~esm1"
},
{
"binary_name": "musl-tools",
"binary_version": "0.9.15-1ubuntu0.1~esm1"
}
],
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}