Lucene search

K
cloudfoundryCloud FoundryCFOUNDRY:F031D0298C522B9EC6730ED703EA80B5
HistoryMay 01, 2017 - 12:00 a.m.

USN-3263-1: FreeType vulnerability | Cloud Foundry

2017-05-0100:00:00
Cloud Foundry
www.cloudfoundry.org
18

0.009 Low

EPSS

Percentile

83.1%

Severity

Medium

Vendor

Canonical Ubuntu

Versions Affected

  • Canonical Ubuntu 14.04

Description

It was discovered that a heap-based buffer overflow existed in the FreeType library. If a user were tricked into using a specially crafted font file, a remote attacker could cause FreeType to crash, resulting in a denial of service, or possibly execute arbitrary code.

Affected Cloud Foundry Products and Versions

Severity is medium unless otherwise noted.

  • Cloud Foundry BOSH stemcells are vulnerable, including:
    • 3151.x versions prior to 3151.16
    • 3263.x versions prior to 3263.24
    • 3312.x versions prior to 3312.24
    • 3363.x versions prior to 3363.20
    • All other stemcells not listed.
  • All versions of Cloud Foundry cflinuxfs2 prior to 1.115.0

Mitigation

OSS users are strongly encouraged to follow one of the mitigations below:

  • The Cloud Foundry project recommends upgrading the following BOSH stemcells:
    • Upgrade 3151.x versions to 3151.16 or later
    • Upgrade 3263.x versions to 3263.24 or later
    • Upgrade 3312.x versions to 3312.24 or later
    • Upgrade 3363.x versions to 3363.20 or later
    • All other stemcells should be upgraded to the latest version.
  • The Cloud Foundry project recommends that Cloud Foundry deployments run with cflinuxfs2 versions 1.115.0 or later.

References