Lucene search

K
cloudfoundryCloud FoundryCFOUNDRY:C46794B7C75A19DD0154048481CA0E90
HistorySep 28, 2016 - 12:00 a.m.

USN-3083-1 Linux kernel vulnerabilities | Cloud Foundry

2016-09-2800:00:00
Cloud Foundry
www.cloudfoundry.org
33

0.002 Low

EPSS

Percentile

54.9%

USN-3083-1 Linux kernel vulnerabilities

High

Vendor

Canonical Ubuntu

Versions Affected

Canonical Ubuntu 14.04 LTS

Description

Dmitry Vyukov discovered that the IPv6 implementation in the Linux kernel did not properly handle options data, including a use-after-free. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2016-3841)

It was discovered that a race condition existed when handling heartbeat-timeout events in the SCTP implementation of the Linux kernel. A remote attacker could use this to cause a denial of service. (CVE-2015-8767)

Affected Products and Versions

_Severity is high unless otherwise noted.
_

  • Cloud Foundry BOSH stemcells (using the 3.19 kernel) are vulnerable, including:
    • 3146.x versions prior to 3146.22
    • 3232.x versions prior to 3232.20
    • Other versions prior to 3262.15

Mitigation

Users of affected versions should apply the following mitigation:

  • The Cloud Foundry team has released patched BOSH stemcells 3146.22, 3232.20, and 3262.15 with an upgraded 3.19 Linux kernel that resolves the aforementioned issues. We recommend that Operators upgrade BOSH stemcell 3146.x versions to 3146.22 OR 3232.x versions to 3232.20 OR 3262.x versions to 3262.15.

Credit

Dmitry Vyukov

References