Lucene search

K
cloudfoundryCloud FoundryCFOUNDRY:6777C8BF53C0BA897196DD6C28C2668F
HistoryMay 02, 2024 - 12:00 a.m.

USN-6698-1: Vim vulnerability | Cloud Foundry

2024-05-0200:00:00
Cloud Foundry
www.cloudfoundry.org
6
vim
canonical ubuntu
low severity
cloud foundry
cve-2024-22667
memory management
denial of service
update instructions
mitigation
stemcells
cflinuxfs4
jammy stemcells
cf deployment
references
history

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.2 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%

Severity

Low

Vendor

Canonical Ubuntu

Versions Affected

  • Canonical Ubuntu 16.04
  • Canonical Ubuntu 18.04
  • Canonical Ubuntu 22.04

Description

Zhen Zhou discovered that Vim did not properly manage memory. An attacker could possibly use this issue to cause a denial of service Update Instructions: Run sudo pro fix USN-6698-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: vim – 2:7.4.1689-3ubuntu1.5+esm23 vim-athena – 2:7.4.1689-3ubuntu1.5+esm23 vim-athena-py2 – 2:7.4.1689-3ubuntu1.5+esm23 vim-common – 2:7.4.1689-3ubuntu1.5+esm23 vim-doc – 2:7.4.1689-3ubuntu1.5+esm23 vim-gnome – 2:7.4.1689-3ubuntu1.5+esm23 vim-gnome-py2 – 2:7.4.1689-3ubuntu1.5+esm23 vim-gtk – 2:7.4.1689-3ubuntu1.5+esm23 vim-gtk-py2 – 2:7.4.1689-3ubuntu1.5+esm23 vim-gtk3 – 2:7.4.1689-3ubuntu1.5+esm23 vim-gtk3-py2 – 2:7.4.1689-3ubuntu1.5+esm23 vim-gui-common – 2:7.4.1689-3ubuntu1.5+esm23 vim-nox – 2:7.4.1689-3ubuntu1.5+esm23 vim-nox-py2 – 2:7.4.1689-3ubuntu1.5+esm23 vim-runtime – 2:7.4.1689-3ubuntu1.5+esm23 vim-tiny – 2:7.4.1689-3ubuntu1.5+esm23 Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro

CVEs contained in this USN include: CVE-2024-22667.

Affected Cloud Foundry Products and Versions

Severity is low unless otherwise noted.

  • Bionic Stemcells
    • 1.x versions
    • All other stemcells not listed.
  • cflinuxfs4
    • All versions prior to 1.84.0
  • Jammy Stemcells
    • 1.x versions prior to 1.423
    • All other stemcells not listed.
  • CF Deployment
    • All versions prior to 30.0.0, or later versions with Jammy Stemcells prior to 1.423

Mitigation

Users of affected products are strongly encouraged to follow the mitigations below.

The Cloud Foundry project recommends upgrading the following releases:

  • Bionic Stemcells
    • There are no fixed versions of this product
    • All other stemcells should be upgraded to the latest version available on bosh.io.
  • cflinuxfs4
    • Upgrade all versions to 1.84.0 or greater
  • Jammy Stemcells
    • Upgrade 1.x versions to 1.423 or greater
    • All other stemcells should be upgraded to the latest version available on bosh.io.
  • CF Deployment
    • Upgrade all versions to 30.0.0 or greater and upgrade Jammy Stemcells to 1.423 or greater

References

History

2024-05-02: Initial vulnerability report published.

Affected configurations

Vulners
Node
cloud_foundrydiegoRange<1.84.0
OR
cloud_foundrydiegoRange<1.423
OR
cloud_foundrycf-networkingRange<30.0.0

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.2 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%