vulnerability

Ubuntu: USN-4768-1 (CVE-2017-15650): musl vulnerabilities

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
Oct 19, 2017
Added
Mar 22, 2023
Modified
Apr 25, 2025

Description

It was discovered that musl did not properly handle kernel syscalls. An
attacker could use this vulnerability to cause a denial of service (crash)
or possibly execute arbitrary code. (CVE-2018-1000001)

It was discovered that musl did not properly handle the parsing of DNS
response codes. A remote attacker could use this vulnerability to cause
resource consumption (infinite loop), denial of service, or possibly
execute arbitrary code. This issue only affected Ubuntu 14.04 ESM.
(CVE-2014-3484)

It was discovered that musl did not properly handle the parsing of DNS
response codes. A remote attacker could use this vulnerability to cause
resource consumption (infinite loop), denial of service, or possibly
execute arbitrary code. This issue only affected Ubuntu 16.04 ESM.
(CVE-2017-15650)

It was discovered that musl did not properly handle the parsing of ipv6
addresses. An attacker could use this vulnerability to cause a denial of
service (crash) or possibly execute arbitrary code. This issue only affected
Ubuntu 14.04 ESM. (CVE-2015-1817)

It was discovered that TRE library, used by musl, did not properly handle
certain inputs. An attacker could use this vulnerability to cause a denial of
service (crash). (CVE-2016-8859)

Solution

ubuntu-pro-upgrade-musl
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.