USN-3318-1: GnuTLS vulnerabilities
Severity
Medium
Vendor
Canonical Ubuntu
Versions Affected
- Canonical Ubuntu 14.04
Description
Hubert Kario discovered that GnuTLS incorrectly handled decoding a status response TLS extension. A remote attacker could possibly use this issue to cause GnuTLS to crash, resulting in a denial of service. This issue only applied to Ubuntu 16.04 LTS, Ubuntu 16.10 and Ubuntu 17.04. (CVE-2017-7507)
It was discovered that GnuTLS incorrectly handled decoding certain OpenPGP certificates. A remote attacker could use this issue to cause GnuTLS to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2017-7869)
Affected Cloud Foundry Products and Versions
Severity is medium unless otherwise noted.
- Cloud Foundry BOSH stemcells are vulnerable, including:
- 3263.x versions prior to 3263.28
- 3312.x versions prior to 3312.29
- 3363.x versions prior to 3363.26
- 3421.x versions prior to 3421.9
- All other stemcells not listed.
- All versions of Cloud Foundry cflinuxfs2 prior to 1.131.0
Mitigation
OSS users are strongly encouraged to follow one of the mitigations below:
- The Cloud Foundry project recommends upgrading the following BOSH stemcells:
- Upgrade 3263.x versions prior to 3263.28
- Upgrade 3312.x versions prior to 3312.29
- Upgrade 3363.x versions prior to 3363.26
- Upgrade 3421.x versions prior to 3421.9
- All other stemcells should be upgraded to the latest version available on bosh.io.
- The Cloud Foundry project recommends that Cloud Foundry deployments run with cflinuxfs2 version 1.131.0 or later.