musl is vulnerable to denial of service (DoS). The vulnerability exists through the wcsnrtombs
function during the handling of the destination buffer size when limiting the input character count.
www.openwall.com/lists/oss-security/2020/11/20/4
lists.apache.org/thread.html/r2134abfe847bea7795f0e53756d10a47e6643f35ab8169df8b8a9eb1@%3Cnotifications.apisix.apache.org%3E
lists.apache.org/thread.html/r90b60cf49348e515257b4950900c1bd3ab95a960cf2469d919c7264e@%3Cnotifications.apisix.apache.org%3E
lists.apache.org/thread.html/ra63e8dc5137d952afc55dbbfa63be83304ecf842d1eab1ff3ebb29e2@%3Cnotifications.apisix.apache.org%3E
lists.debian.org/debian-lts-announce/2020/11/msg00050.html
lists.fedoraproject.org/archives/list/[email protected]/message/LKQ3RVSMVZNZNO4D65W2CZZ4DMYFZN2Q/
lists.fedoraproject.org/archives/list/[email protected]/message/UW27QVY7ERPTSGKS4KAWE5TU7EJWHKVQ/
musl.libc.org/releases.html
www.openwall.com/lists/oss-security/2020/11/20/4
www.oracle.com//security-alerts/cpujul2021.html
www.oracle.com/security-alerts/cpuoct2021.html