Lucene search

K
cloudfoundryCloud FoundryCFOUNDRY:56F8AD087BA17D1467BF25D4B900244C
HistoryMar 18, 2024 - 12:00 a.m.

USN-6409-1: GNU C Library vulnerabilities | Cloud Foundry

2024-03-1800:00:00
Cloud Foundry
www.cloudfoundry.org
9
gnu c library
canonical ubuntu
cloud foundry
vulnerabilities
cflinuxfs4
jammy stemcells
cf deployment
privilege escalation
dns responses
denial of service
update instructions
mitigation
usn-6409-1
2023-4911
2023-4527

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.8

Confidence

High

EPSS

0.016

Percentile

87.4%

Severity

Unknown

Vendor

Canonical Ubuntu

Versions Affected

  • Canonical Ubuntu 22.04

Description

It was discovered that the GNU C Library incorrectly handled the GLIBC_TUNABLES environment variable. An attacker could possibly use this issue to perform a privilege escalation attack. (CVE-2023-4911) It was discovered that the GNU C Library incorrectly handled certain DNS responses when the system was configured in no-aaaa mode. A remote attacker could possibly use this issue to cause the GNU C Library to crash, resulting in a denial of service. This issue only affected Ubuntu 23.04. (CVE-2023-4527) Update Instructions: Run sudo pro fix USN-6409-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libc-bin – 2.35-0ubuntu3.4 glibc-doc – 2.35-0ubuntu3.4 locales-all – 2.35-0ubuntu3.4 libc6-i386 – 2.35-0ubuntu3.4 libc6-s390 – 2.35-0ubuntu3.4 libc6-dev-i386 – 2.35-0ubuntu3.4 nscd – 2.35-0ubuntu3.4 libc6-dev-x32 – 2.35-0ubuntu3.4 libc6-dev – 2.35-0ubuntu3.4 libc6-amd64 – 2.35-0ubuntu3.4 libc6-x32 – 2.35-0ubuntu3.4 libc6-dev-amd64 – 2.35-0ubuntu3.4 libc-dev-bin – 2.35-0ubuntu3.4 libc6 – 2.35-0ubuntu3.4 libc6-prof – 2.35-0ubuntu3.4 libc-devtools – 2.35-0ubuntu3.4 glibc-source – 2.35-0ubuntu3.4 libc6-dev-s390 – 2.35-0ubuntu3.4 locales – 2.35-0ubuntu3.4 No subscription required

Affected Cloud Foundry Products and Versions

Severity is unknown unless otherwise noted.

  • cflinuxfs4
    • All versions prior to 1.40.0
  • Jammy Stemcells
    • 1.x versions prior to 1.250
    • All other stemcells not listed.
  • CF Deployment
    • All versions with Jammy Stemcells prior to 1.250

Mitigation

Users of affected products are strongly encouraged to follow the mitigations below.

The Cloud Foundry project recommends upgrading the following releases:

  • cflinuxfs4
    • Upgrade all versions to 1.40.0 or greater
  • Jammy Stemcells
    • Upgrade 1.x versions to 1.250 or greater
    • All other stemcells should be upgraded to the latest version available on bosh.io.
  • CF Deployment
    • For all versions, upgrade Jammy Stemcells to 1.250 or greater

References

History

2024-03-18: Initial vulnerability report published.

Affected configurations

Vulners
Node
cloudfoundrygorouterRange<1.40.0
OR
cloudfoundrygorouterRange<1.250
OR
cloudfoundrycf-deploymentRange<1.250

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.8

Confidence

High

EPSS

0.016

Percentile

87.4%