Stack-based buffer overflow in fprintf in musl before 0.8.8 and earlier allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string to an unbuffered stream such as stderr.Referenceshttp://www.openwall.com/lists/musl/2012/04/17/1http://www.openwall.com/lists/oss-security/2012/04/18/6http://www.openwall.com/lists/oss-security/2012/04/18/5http://www.etalabs.net/musl/download.htmlhttp://www.securityfocus.com/bid/53144