A security vulnerability has been identified in all levels of IBM Spectrum Scale that could allow one to obtain root privilege by injecting parameters into setuid files. A fix for this vulnerability is available.
DESCRIPTION: A security vulnerability has been identified in all levels of IBM Spectrum Scale (GPFS) that could allow a local attacker to obtain root privilege by injecting parameters into setuid files.
CVSS Base Score: 8.1
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/166282 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)
Affected Products and Versions
IBM Spectrum Scale V188.8.131.52 through V184.108.40.206
IBM Spectrum Scale V220.127.116.11 through V18.104.22.168
For IBM Spectrum Scale V22.214.171.124 through V126.96.36.199, apply V188.8.131.52 available from FixCentral at:
If you cannot apply the latest level of service, contact IBM Service for an efix:
- For IBM Spectrum Scale V184.108.40.206 through V220.127.116.11, reference APAR IJ18477
- For IBM Spectrum Scale V18.104.22.168 through V22.214.171.124, reference APAR IJ18518
To contact IBM Service, see http://www.ibm.com/planetwide/
Workarounds and Mitigations
ls -l /usr/lpp/mmfs/bin | grep r-s
Then reset the setuid bit for each such file by issuing this command on each file
chmod u-s file
Once the workaround is applied, a number of commands may no longer work when not invoked by unprivileged users, including:
Get Notified about Future Security Bulletins
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.
Internal Use Only
Was this topic helpful?
07 October 2019