IBM Support

Security Bulletin: A security vulnerability has been identified in lodash shipped with PowerAI.

Security Bulletin


Summary

Vulnerability CVE-2019-10744 found in lodash package.

Vulnerability Details

CVEID:   CVE-2019-10744
DESCRIPTION:   Versions of lodash lower than 4.17.12 are vulnerable to Prototype Pollution. The function defaultsDeep could be tricked into adding or modifying properties of Object.prototype using a constructor payload.
CVSS Base score: 6.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/167415 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L)

Affected Products and Versions

Affected Product(s) Version(s)
IBM PowerAI 1.5.4
IBM PowerAI 1.6.0
Watson Machine Learning Community Edition 1.6.1
Watson Machine Learning Community Edition 1.6.2
Watson Machine Learning Accelerator 1.1.2
Note : The product was renamed after the 1.6.0 version.

Remediation/Fixes

For IBM PowerAI 1.5.4 and Watson Machine Learning Accelerator 1.1.2:

Download fix : http://www.ibm.com/support/fixcentral/quickorder?product=ibm%2FOther+software%2FIBM+PowerAI&fixids=powerai-security-fix-ppc64le-rhel-1.5.4&source=SAR

Install instructions: https://www.ibm.com/support/pages/node/1135077

For IBM PowerAI 1.6.0 and Watson Machine Learning Community Edition 1.6.1 :

Upgrade to WML CE 1.6.2, which includes the fixes. See https://www.ibm.com/support/knowledgecenter/SS5SF7 for upgrading instructions.

For Watson Machine Learning Community Edition 1.6.2 :

For installing WML CE from scratch

New installations of WML CE include all security fixes. See https://www.ibm.com/support/knowledgecenter/SS5SF7 for installation instructions.

Updating an existing WML CE installation

It is recommended to keep packages up to date. To update all packages to the latest versions use:

conda update --all

To update individual packages, use the package name:

conda update tensorboard

If you have previously installed WML CE using the powerai meta-package, you can also use that to update to the latest packages.

conda update powerai

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

References

Off

Change History

21 Jan 2020: Initial Publication

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.

Document Location

Worldwide

[{"Business Unit":{"code":"BU053","label":"Cloud & Data Platform"},"Product":{"code":"SGLMYS","label":"IBM PowerAI"},"Component":"lodash","Platform":[{"code":"PF043","label":"Red Hat"}],"Version":"1.5.4, 1.6.0, 1.6.1, 1.6.2","Edition":"ALL","Line of Business":{"code":"LOB10","label":"Data and AI"}},{"Business Unit":{"code":null,"label":null},"Product":{"code":"SSFHA8","label":"IBM PowerAI Enterprise"},"Component":"lodash","Platform":[{"code":"PF043","label":"Red Hat"}],"Version":"1.1.2","Edition":"ALL","Line of Business":{"code":null,"label":null}}]

Document Information

Modified date:
22 January 2020

UID

ibm11274908