Cloud Foundry Logo
blog single gear
Security Advisory

USN-3815-1: gettext vulnerability

USN-3815-1: gettext vulnerability

Severity

Medium

Vendor

Canonical Ubuntu

Versions Affected

  • Canonical Ubuntu 14.04
  • Canonical Ubuntu 16.04

Description

It was discovered that gettext incorrectly handled certain messages. An attacker could possibly use this issue to execute arbitrary code.

CVEs contained in this USN include: CVE-2018-18751

Affected Cloud Foundry Products and Versions

Severity is medium unless otherwise noted.

  • Cloud Foundry BOSH trusty-stemcells are vulnerable, including:
    • 3586.x versions prior to 3586.56
    • 3541.x versions prior to 3541.60
    • 3468.x versions prior to 3468.86
    • 3445.x versions prior to 3445.82
    • 3421.x versions prior to 3421.99
    • All other stemcells not listed.
  • Cloud Foundry BOSH xenial-stemcells are vulnerable, including:
    • 170.x versions prior to 170.6
    • 97.x versions prior to 97.33
    • All other stemcells not listed.

Mitigation

Users of affected products are strongly encouraged to follow one of the mitigations below:

  • The Cloud Foundry project recommends upgrading the following BOSH trusty-stemcells:
    • Upgrade 3586.x versions to 3586.56
    • Upgrade 3541.x versions to 3541.60
    • Upgrade 3468.x versions to 3468.86
    • Upgrade 3445.x versions to 3445.82
    • Upgrade 3421.x versions to 3421.99
    • All other stemcells should be upgraded to the latest version available on bosh.io.
  • The Cloud Foundry project recommends upgrading the following BOSH xenial-stemcells:
    • Upgrade 170.x versions to 170.6
    • Upgrade 97.x versions to 97.33
    • All other stemcells should be upgraded to the latest version available on bosh.io.

References

Cloud Foundry Foundation Security Team Profile Image

Cloud Foundry Foundation Security Team, AUTHOR

SEE ALL ARTICLES