High Severity

IBM Storage — Meltdown/Spectre

Share this post:

Three security vulnerabilities that allow unauthorized users to bypass the hardware barrier between applications and kernel memory have been made public. These vulnerabilities all make use of speculative execution to perform side-channel information disclosure attacks. The first two vulnerabilities, CVE-2017-5753 and CVE-2017- 5715, are collectively known as Spectre, and allow user-level code to infer data from unauthorized memory; the third vulnerability, CVE-2017-5754, is known as Meltdown, and allows user-level code to infer the contents of kernel memory. The vulnerabilities are all variants of the same class of attacks and differ in the way that speculative execution is exploited.

Product Impact

These vulnerabilities are present in many microprocessors, such as processors used by IBM Storage Appliances and IBM Storage Spectrum software running on servers, including IBM Elastic Storage Server systems. To exploit any of these vulnerabilities, an attacker must be able to run malicious code on an affected system.

IBM Storage Appliances are not impacted by this vulnerability, because unlike general purpose computing systems, they are closed systems and are designed to prevent users from loading and executing code other than code provided by IBM. Nonetheless, in an abundance of caution, IBM is evaluating firmware updates provided by the server and OS vendor(s) to IBM Storage Appliances.

In the case of IBM Cloud Object Storage systems, execution of non-IBM code is supported, but proper security credentials are required to install said code on the systems.  Cloud Object Storage systems updates to address these vulnerabilities are dependent on OS vendor(s) updates being released and will be provided on FixCentral when available.

IBM Cloud Object Storage software running in a shared virtual environment and IBM Storage Spectrum software running on servers, including IBM Elastic Storage Server system (which is not a closed system), must follow the guidelines established by the server and OS vendor(s).

Before installing patches from OS vendor(s) on Spectrum Scale and Elastic Storage Server system, please refer to the interoperability matrix here.

The IBM Spectrum Protect Plus software is shipped as a virtual machine image that contains its own OS distribution and the updates for this OS distribution should be applied following the procedures outlined here.  This is in addition to following the guidelines established by the server and OS vendors for the servers that host the IBM Spectrum Protect Plus image.

For all IBM storage products, we recommend implementing any firmware and OS updates in accordance with your normal procedures.

IBM currently has no knowledge of any adverse use of the vulnerabilities that are described in this advisory.

More High Severity stories

Potential Impact on Processors in the POWER Family

May 22, 2018 6:25 pm EDT | High Severity

In January 2018, three security vulnerabilities were made public that allow unauthorized users to bypass the hardware barrier between applications and kernel memory. These vulnerabilities all make use of speculative execution to perform side-channel information disclosure attacks. The first two vulnerabilities, CVE-2017-5753 and CVE-2017- 5715, are collectively known as Spectre, and allow user-level code to ...read more


Spectre / Meltdown Vulnerability statement for IBM Z Crypto Hardware Security Modules

Apr 6, 2018 11:50 am EDT | High Severity

Three security vulnerabilities that allow unauthorized users to bypass the hardware barrier between applications and kernel memory have been made public. These vulnerabilities all make use of speculative execution to perform side-channel information disclosure attacks. The first two vulnerabilities, CVE-2017-5753 and CVE-2017- 5715, are collectively known as Spectre, and allow user-level code to infer data ...read more


IBM Security Bulletin: This Power Hardware Management Console (HMC) update is being released to address Common Vulnerabilities and Exposures issue numbers CVE-2017-5715, CVE-2017-5753 and CVE-2017-5754 (known as Spectre and Meltdown).

Apr 3, 2018 6:22 pm EDT | High Severity

In response to recently reported security vulnerabilities, this Power HMC update is being released to address Common Vulnerabilities and Exposures issue numbers CVE-2017-5715, CVE-2017-5753 and CVE-2017-5754. CVE(s): CVE-2017-5753, CVE-2017-5715, CVE-2017-5754 Products Addressed and Versions: Power HMC V8.8.5.0 Power HMC V8.8.6.0 Power HMC V8.8.7.0 Refer to the following reference URLs for remediation and additional vulnerability details: ...read more