Lucene search

K
cloudfoundryCloud FoundryCFOUNDRY:482A184FE0A9A84338FFE0A421B192C1
HistoryFeb 05, 2020 - 12:00 a.m.

USN-4236-2: Libgcrypt vulnerability | Cloud Foundry

2020-02-0500:00:00
Cloud Foundry
www.cloudfoundry.org
27

CVSS2

2.6

Attack Vector

LOCAL

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:L/AC:H/Au:N/C:P/I:P/A:N

CVSS3

6.3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N

EPSS

0.003

Percentile

72.1%

Severity

Medium

Vendor

Canonical Ubuntu

Versions Affected

  • Canonical Ubuntu 16.04

Description

USN-4236-1 fixed a vulnerability in Libgcrypt. This update provides the corresponding fix for Ubuntu 16.04 LTS.

Original advisory details:

It was discovered that Libgcrypt was susceptible to a ECDSA timing attack. An attacker could possibly use this attack to recover sensitive information.

CVEs contained in this USN include: CVE-2019-13627.

Affected Cloud Foundry Products and Versions

Severity is medium unless otherwise noted.

  • Xenial Stemcells
    • 621.x versions prior to 621.50
    • 456.x versions prior to 456.93
    • 315.x versions prior to 315.163
    • 250.x versions prior to 250.178
    • 170.x versions prior to 170.198
    • 97.x versions prior to 97.226
    • All other stemcells not listed.

Mitigation

Users of affected products are strongly encouraged to follow the mitigations below. The Cloud Foundry project recommends upgrading the following releases:

  • Xenial Stemcells
    • Upgrade 621.x versions to 621.50 or greater
    • Upgrade 456.x versions to 456.93 or greater
    • Upgrade 315.x versions to 315.163 or greater
    • Upgrade 250.x versions to 250.178 or greater
    • Upgrade 170.x versions to 170.198 or greater
    • Upgrade 97.x versions to 97.226 or greater
    • All other stemcells should be upgraded to the latest version available on bosh.io.

References

History

2020-01-14: Initial vulnerability report published.

Affected configurations

Vulners
Node
cloudfoundryxenial_stemcellsRange<621.50
OR
cloudfoundryxenial_stemcellsRange<456.93
OR
cloudfoundryxenial_stemcellsRange<315.163
OR
cloudfoundryxenial_stemcellsRange<250.178
OR
cloudfoundryxenial_stemcellsRange<170.198
OR
cloudfoundryxenial_stemcellsRange<97.226
VendorProductVersionCPE
cloudfoundryxenial_stemcells*cpe:2.3:a:cloudfoundry:xenial_stemcells:*:*:*:*:*:*:*:*

CVSS2

2.6

Attack Vector

LOCAL

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:L/AC:H/Au:N/C:P/I:P/A:N

CVSS3

6.3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N

EPSS

0.003

Percentile

72.1%