USN-2821-1 GnuTLS vulnerability
- Ubuntu 14.04
It was discovered that GnuTLS incorrectly validated the first byte of padding in CBC modes. A remote attacker could possibly use this issue to perform a padding oracle attack.
The Cloud Foundry project released a BOSH stemcell version 3146 that has the patched version of the Linux kernel. A new Cloud Foundry rootfs was also released, cflinuxfs2 v.1.20.0, that has the patches.
Pivotal is releasing an updated version of Pivotal Cloud Foundry Suite which references this patched BOSH stemcell and CF rootfs.
Severity is high unless otherwise noted.
- All versions of Cloud Foundry BOSH stemcells prior to 3146 are vulnerable.
- All versions of Cloud Foundry cflinuxfs2 prior to v.1.20.0.
- Pivotal Cloud Foundry Elastic Runtime pre-1.5.9 versions and 1.6.x versions prior to 1.6.6.
- Pivotal Ops Manager pre-1.5.10 versions and 1.6.x versions prior to 1.6.4.
- Pivotal Redis pre-1.4.14 versions and 1.5.x versions prior to 1.5.2.
- Pivotal GemFire SSC pre-188.8.131.52 versions and pre-184.108.40.206 versions.
- Pivotal RabbitMQ pre-1.4.10 versions.
- Pivotal Ops Metrics pre-1.4.8 versions and all 1.5.x versions.
Users of affected versions should apply the following mitigation:
- The Cloud Foundry project recommends that Cloud Foundry deployments run with BOSH stemcells 3146 or later versions and cflinuxfs2 v.1.20.0 or later versions.
- Pivotal recommends that customers upgrade to the 1.5.9 or later 1.5.x versions or the 1.6.6 or later versions of Pivotal Cloud Foundry Elastic Runtime.
- 1.5.10 or later 1.5.x versions or the 1.6.4 or later versions of Pivotal Ops Manager.
- 220.127.116.11 or later 1.1.0.x versions or the 18.104.22.168 or later versions of Pivotal GemFire SSC.
- 1.4.14 or later 1.4.x versions and 1.5.2 or later versions of Pivotal Redis.
- 1.4.10 or later versions of RabbitMQ.
- The 1.4.8 or later 1.4.x versions or the 1.6.1 or later versions of Pivotal Ops Metrics.