Lucene search

K
cloudfoundryCloud FoundryCFOUNDRY:74E2FBF4B56FCE22B3C6FE238363E968
HistoryOct 12, 2023 - 12:00 a.m.

USN-6369-1: libwebp vulnerability | Cloud Foundry

2023-10-1200:00:00
Cloud Foundry
www.cloudfoundry.org
24
vulnerability
libwebp
canonical ubuntu
cloud foundry
denial of service
arbitrary code
cve-2023-4863
cflinuxfs4
cf deployment
upgrade
mitigations
usn-6369-1

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0.629

Percentile

97.9%

Severity

Medium

Vendor

Canonical Ubuntu

Versions Affected

  • Canonical Ubuntu 22.04

Description

It was discovered that libwebp incorrectly handled certain malformed images. If a user or automated system were tricked into opening a specially crafted image file, a remote attacker could use this issue to cause libwebp to crash, resulting in a denial of service, or possibly execute arbitrary code. Update Instructions: Run sudo pro fix USN-6369-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: webp – 0.6.1-2ubuntu0.20.04.3 libwebp6 – 0.6.1-2ubuntu0.20.04.3 libwebpmux3 – 0.6.1-2ubuntu0.20.04.3 libwebp-dev – 0.6.1-2ubuntu0.20.04.3 libwebpdemux2 – 0.6.1-2ubuntu0.20.04.3 No subscription required

CVEs contained in this USN include: CVE-2023-4863.

Affected Cloud Foundry Products and Versions

Severity is medium unless otherwise noted.

  • cflinuxfs4
    • All versions prior to 1.35.0
  • CF Deployment
    • All versions prior to 32.9.0

Mitigation

Users of affected products are strongly encouraged to follow the mitigations below.

The Cloud Foundry project recommends upgrading the following releases:

  • cflinuxfs4
    • Upgrade all versions to 1.35.0 or greater
  • CF Deployment
    • Upgrade all versions to 32.9.0 or greater

References

History

2023-10-05: Initial vulnerability report published.

Affected configurations

Vulners
Node
cloudfoundrycflinuxfs4Range<1.35.0
OR
cloudfoundrycf-deploymentRange<32.9.0
VendorProductVersionCPE
cloudfoundrycflinuxfs4*cpe:2.3:a:cloudfoundry:cflinuxfs4:*:*:*:*:*:*:*:*
cloudfoundrycf-deployment*cpe:2.3:a:cloudfoundry:cf-deployment:*:*:*:*:*:*:*:*

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0.629

Percentile

97.9%