IBM Support

IBM PureApplication System Version 2.1.2.2

Download


Abstract

This document lists the fixes contained in IBM PureApplication System 2.1.2.2.

Download Description

To download the interim fix, go to the PureApplication System product page on Fix Central.

Version 2.1.2.2 includes fixes for these security vulnerabilities:

CVE-2015-7575
DESCRIPTION: The TLS protocol could allow weaker than expected security caused by a collision attack when using the MD5 hash function for signing a ServerKeyExchange message during a TLS handshake. An attacker could exploit this vulnerability using man-in-the-middle techniques to impersonate a TLS server and obtain credentials. This vulnerability is commonly referred to as "SLOTH".

CVEID: CVE-2015-3193
DESCRIPTION: OpenSSL could allow a remote attacker to obtain sensitive information, caused by an error in the x86_64 Montgomery squaring procedure. An attacker with online access to an unpatched system could exploit this vulnerability to obtain private key information.

CVEID: CVE-2015-3194
DESCRIPTION: OpenSSL is vulnerable to a denial of service, caused by a NULL pointer dereference when verifying certificates via a malformed routine. An attacker could exploit this vulnerability using signature verification routines with an absent PSS parameter to cause any certificate verification operation to crash.

CVEID: CVE-2015-3195
DESCRIPTION: OpenSSL could allow a remote attacker to obtain sensitive information, caused by a memory leak in a malformed X509_ATTRIBUTE structure. An attacker could exploit this vulnerability to obtain CMS data and other sensitive information.

CVEID: CVE-2015-3196
DESCRIPTION: OpenSSL is vulnerable to a denial of service, caused by a race condition when PSK identity hints are received by a multi-threaded client and the SSL_CTX structure is updated with the incorrect value. An attacker could exploit this vulnerability to possibly corrupt memory and cause a denial of service.

CVEID: CVE-2015-1794
DESCRIPTION: OpenSSL is vulnerable to a denial of service, caused by an error when a client receives a ServerKeyExchange for an anonymous DH ciphersuite with the value of p set to 0. An attacker could exploit this vulnerability to trigger a segfault and cause a denial of service.

CVEID: CVE-2016-0705
DESCRIPTION: OpenSSL is vulnerable to a denial of service, caused by a double-free error when parsing DSA private keys. An attacker could exploit this vulnerability to corrupt memory and cause a denial of service.

CVEID: CVE-2016-0798
DESCRIPTION: OpenSSL is vulnerable to a denial of service, caused by a memory leak in SRP servers. An attacker could exploit this vulnerability using a specially crafted username value to cause a denial of service.

CVEID: CVE-2016-0797
DESCRIPTION: OpenSSL is vulnerable to a denial of service, caused by a NULL pointer dereference in the BN_hex2bn/BN_dec2bn() function. An attacker could exploit this vulnerability using specially crafted data to cause a denial of service.

CVEID: CVE-2016-0799
DESCRIPTION: OpenSSL could allow a remote attacker to obtain sensitive information, caused by a memory error in the BIO_*printf() functions. An attacker could exploit this vulnerability using specially crafted data to trigger an out-of-bounds read.

CVEID: CVE-2016-0702
DESCRIPTION: OpenSSL could allow a local attacker to obtain sensitive information, caused by a side-channel attack against a system based on the Intel Sandy-Bridge microarchitecture. An attacker could exploit this vulnerability to recover RSA keys.

CVEID: CVE-2016-0704
DESCRIPTION: OpenSSL could allow a remote attacker to bypass security restrictions. The s2_srvr.c code overwrites the wrong bytes in the master-key when applying Bleichenbacher protection for export cipher suites. An attacker could exploit this vulnerability using a Bleichenbacher oracle to decrypt sessions.

CVEID: CVE-2016-2842
DESCRIPTION: OpenSSL is vulnerable to a denial of service, caused by the failure to verify that a certain memory allocation succeeds by the doapr_outch function. A remote attacker could exploit this vulnerability using a specially crafted string to cause an out-of-bounds write or consume an overly large amount of resources.

CVEID: CVE-2016-0701
DESCRIPTION: OpenSSL could allow a remote attacker to conduct man-in-the-middle attacks, caused by the use of weak Diffie-Hellman parameters based on unsafe primes that are generated and stored in X9.42-style parameter files. By performing multiple handshakes using the same private DH exponent, an attacker could exploit this vulnerability to conduct man-in-the-middle attacks.

CVEID: CVE-2015-3197
DESCRIPTION: OpenSSL could allow a remote attacker to conduct man-in-the-middle attacks, caused by an error related to the negotiation of disabled SSLv2 ciphers by malicious SSL/TLS clients. An attacker could exploit this vulnerability to conduct man-in-the-middle attacks.


The following table contains the Authorized Program Analysis Reports (APARs) included in this release.

If an integrated pattern or component is not listed, there were no fixes for that pattern or component in this version.

System APARs

APAR
Abstract
PureApplication System: Call Home function fails to upload log files that are 2 GB in size or larger
PureApplication System: Performance listing virtual system patterns decreases with higher number of patterns
PureApplication System: Virtual machine view shows 0% utilization for virtual memory value
PureApplication System: Performance issue occurs for non-administrative user listing virtual system patterns
PureApplication System: Unable to login to the hardware management console without changing the password
PureApplication System: Creating snapshot fails with "Error writing to zip archive"
PureApplication System: Deploy operation failed - LPAR was not added to processor pool
PureApplication System: Errors in the pre-upgrade validation checks for PureApplication System version 2.1.2.1
PureApplication System: Service console cannot connect using HTTPS on service level access page.

Off
[{"Product":{"code":"SSM8NY","label":"PureApplication System"},"Business Unit":{"code":"BU053","label":"Cloud & Data Platform"},"Component":"--","Platform":[{"code":"PF016","label":"Linux"},{"code":"PF002","label":"AIX"}],"Version":"2.1.2.2","Edition":"","Line of Business":{"code":"","label":""}}]

Problems (APARS) fixed
IT13255;IT14523;IT14526;IT14573;IT14683;IT14702;IT14761;IT14804

Document Information

Modified date:
15 June 2018

UID

swg24042267