ArchLinux: 201503-26: musl: arbitrary code execution
Summary
A stack-based buffer overflow has been found in musl libc's ipv6 address literal parsing code. Programs which call the inet_pton or getaddrinfo function with AF_INET6 or AF_UNSPEC and untrusted address strings are affected. Successful exploitation yields control of the return address. Having enabled stack protector at the application level does not mitigate the issue.
Resolution
Upgrade to 1.1.8-1.
# pacman -Syu "musl>=1.1.8-1"
The problem has been fixed upstream in version 1.1.8.
References
https://www.openwall.com/lists/musl/2015/03/30/1 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1817
Workaround
None.