USN-2718-1 Address Configuration Change Vulnerabilities
- Ubuntu 14.04
Marcelo Ricardo Leitner discovered a race condition in the Linux kernel's SCTP address configuration lists when using Address Configuration Change (ASCONF) options on a socket. An unprivileged local user could exploit this flaw to cause a denial of service (system crash).
The Cloud Foundry project released a BOSH stemcell version 3048 that has the patched version of OpenSSH.
Pivotal is releasing an updated version of Pivotal Cloud Foundry Suite which references this patched BOSH stemcell.
Affected VMware Products and Versions
Severity is medium unless otherwise noted.
- All versions of Cloud Foundry BOSH stemcells prior to 3048 have versions of the kernel vulnerable to USN-2718-1
- Pivotal Cloud Foundry Elastic Runtime pre-1.5.4 versions, Pivotal Ops Manager pre-1.5.5 versions, Pivotal Redis pre-1.4.8 versions, Pivotal GemFire SSC pre-1.0.2 versions, Pivotal RabbitMQ pre-1.4.4 versions, Pivotal Ops Metrics pre-1.4.2 versions, and Pivotal MySQL pre-1.6.2 versions.
Users of affected versions should apply the following mitigation:
- The Cloud Foundry project recommends that Cloud Foundry deployments run with BOSH stemcells 3048 or later versions.
- Pivotal recommends that customers upgrade to the 1.5.4 or later versions of Pivotal Cloud Foundry Elastic Runtime, 1.5.4 or later versions of Pivotal Ops Manager, 1.0.2 or later versions of Pivotal GemFire SSC, 1.4.8 or later versions of Pivotal Redis, 1.4.4 or later versions of RabbitMQ, 1.4.2 or later versions of Pivotal Ops Metrics, and 1.6.2 or later versions of Pivotal MySQL.
Marcelo Ricardo Leitner