USN-3201-1: Bind vulnerabilities | Cloud Foundry

2017-03-31T00:00:00
ID CFOUNDRY:34F7A6F1E2017D755562A0A6438CB284
Type cloudfoundry
Reporter Cloud Foundry
Modified 2017-03-31T00:00:00

Description

Severity

Medium

Vendor

Canonical Ubuntu

Versions Affected

  • Canonical Ubuntu 14.04

Description

It was discovered that Bind incorrectly handled rewriting certain query responses when using both DNS64 and RPZ. A remote attacker could possibly use this issue to cause Bind to crash, resulting in a denial of service.

Affected Cloud Foundry Products and Versions

Severity is medium unless otherwise noted.

  • Cloud Foundry BOSH stemcells are vulnerable, including:
    • 3151.x versions prior to 3151.14
    • 3233.x versions prior to 3233.16
    • 3263.x versions prior to 3263.22
    • 3312.x versions prior to 3312.22
    • 3363.x versions prior to 3363.14
    • All other stemcells not listed.
  • All versions of Cloud Foundry cflinuxfs2 prior to 1.102.0

Mitigation

OSS users are strongly encouraged to follow one of the mitigations below:

  • The Cloud Foundry project recommends upgrading the following BOSH stemcells:
    • Upgrade 3151.x versions to 3151.14 or later
    • Upgrade 3233.x versions to 3233.16 or later
    • Upgrade 3263.x versions to 3263.22 or later
    • Upgrade 3312.x versions to 3312.22 or later
    • Upgrade 3363.x versions to 3363.14 or later
    • All other stemcells should be upgraded to the latest version.
  • The Cloud Foundry project recommends that Cloud Foundry deployments run with cflinuxfs2 versions 1.102.0 or later.

References