CVE-2015-3636 ipv4 use-after-free
- Ubuntu 14.04
A use-after-free flaw was discovered in the Linux kernel’s ipv4 ping support. A local user could exploit this flaw to gain administrative privileges on the system.
The Cloud Foundry project is releasing a BOSH stemcell version 2983 that has the patched version of ipv4.
Pivotal is releasing an updated version of Pivotal Elastic Runtime which references this patched BOSH stemcell. The other Pivotal Cloud Foundry products do not expose this vulnerability to users of the system.
Affected VMware Products and Versions
Severity is medium unless otherwise noted.
- All versions of Cloud Foundry BOSH stemcells prior to 2983 and prior have versions of the kernel vulnerable to CVE-2015-3636
- Pivotal CF Elastic Runtime 1.4.3 and earlier versions
Users of affected versions should apply the following mitigation:
- The Cloud Foundry project recommends that Cloud Foundry Runtime Deployments run with BOSH stemcells 2983 or later when they are available, which contain the patched version of ipv4 that resolves CVE-2015-3636.
- Pivotal recommends that customers upgrade to the 1.4.4 or later versions of Pivotal CF Elastic Runtime, which references the 2983 stemcell. The IaaS-specific version of the stemcell will also need to be uploaded and installed along with Elastic Runtime, as it contains the fix to the ipv4 vulnerability identified in CVE-2015-3636.