High Severity

IBM Storage — Meltdown/Spectre

Share this post:

Three security vulnerabilities that allow unauthorized users to bypass the hardware barrier between applications and kernel memory have been made public. These vulnerabilities all make use of speculative execution to perform side-channel information disclosure attacks. The first two vulnerabilities, CVE-2017-5753 and CVE-2017- 5715, are collectively known as Spectre, and allow user-level code to infer data from unauthorized memory; the third vulnerability, CVE-2017-5754, is known as Meltdown, and allows user-level code to infer the contents of kernel memory. The vulnerabilities are all variants of the same class of attacks and differ in the way that speculative execution is exploited.

Product Impact

These vulnerabilities are present in many microprocessors, such as processors used by IBM Storage Appliances and IBM Storage Spectrum software running on servers, including IBM Elastic Storage Server systems. To exploit any of these vulnerabilities, an attacker must be able to run malicious code on an affected system.

IBM Storage Appliances are not impacted by this vulnerability, because unlike general purpose computing systems, they are closed systems and are designed to prevent users from loading and executing code other than code provided by IBM. Nonetheless, in an abundance of caution, IBM is evaluating firmware updates provided by the server and OS vendor(s) to IBM Storage Appliances.

In the case of IBM Cloud Object Storage systems, execution of non-IBM code is supported, but proper security credentials are required to install said code on the systems.  Cloud Object Storage systems updates to address these vulnerabilities are dependent on OS vendor(s) updates being released and will be provided on FixCentral when available.

IBM Cloud Object Storage software running in a shared virtual environment and IBM Storage Spectrum software running on servers, including IBM Elastic Storage Server system (which is not a closed system), must follow the guidelines established by the server and OS vendor(s).

Before installing patches from OS vendor(s) on Spectrum Scale and Elastic Storage Server system, please refer to the interoperability matrix here.

The IBM Spectrum Protect Plus software is shipped as a virtual machine image that contains its own OS distribution and the updates for this OS distribution should be applied following the procedures outlined here.  This is in addition to following the guidelines established by the server and OS vendors for the servers that host the IBM Spectrum Protect Plus image.

For all IBM storage products, we recommend implementing any firmware and OS updates in accordance with your normal procedures.

IBM currently has no knowledge of any adverse use of the vulnerabilities that are described in this advisory.

More High Severity stories

IBM Security Bulletin: Multiple IBM MQ Security Vulnerabilities Affect IBM Sterling B2B Integrator

Aug 19, 2019 12:13 pm EDT | High Severity

IBM Sterling B2B Integrator Standard Edition has addressed the IBM MQ security vulnerabilities CVE(s): CVE-2019-4039, CVE-2019-4055, CVE-2019-4078, CVE-2018-1925, CVE-2019-4239, CVE-2018-1998, CVE-2018-1974, CVE-2018-1792, CVE-2017-1786, CVE-2018-1684, CVE-2019-4261 Affected product(s) and affected version(s):IBM Sterling B2B Integrator 5.0.0.1 – 5.2.6.4 Refer to the following reference URLs for remediation and additional vulnerability details:Source Bulletin: https://www-01.ibm.com/support/docview.wss?uid=ibm10967151X-Force Database: https://exchange.xforce.ibmcloud.com/vulnerabilities/156163X-Force Database: https://exchange.xforce.ibmcloud.com/vulnerabilities/156564X-Force Database: ...read more


IBM Security Bulletin: API Connect V2018 (ova) is impacted by vulnerabilities in Ubuntu OS (CVE-2019-4504)

Aug 19, 2019 12:13 pm EDT | High Severity

IBM API Connect has addressed the following vulnerability. CVE(s): CVE-2019-4504 Affected product(s) and affected version(s): Affected IBM API Management Affected Versions IBM API Connect 2018.1-2018.4.1.6 Refer to the following reference URLs for remediation and additional vulnerability details:Source Bulletin: http://www.ibm.com/support/docview.wss?uid=ibm10961550X-Force Database: https://exchange.xforce.ibmcloud.com/vulnerabilities/164363 ...read more


IBM Security Bulletin: API Connect V2018 is impacted by a Kubernetes vulnerability(CVE-2019-11246)

Aug 19, 2019 12:13 pm EDT | Medium Severity

IBM API Connect has addressed the following vulnerability. CVE(s): CVE-2019-11246 Affected product(s) and affected version(s): Affected IBM API Management Affected Versions IBM API Connect 2018.1-2018.4.1.6 Refer to the following reference URLs for remediation and additional vulnerability details:Source Bulletin: http://www.ibm.com/support/docview.wss?uid=ibm10960606X-Force Database: https://exchange.xforce.ibmcloud.com/vulnerabilities/162892 ...read more