Security Bulletin
Summary
IBM RackSwitch firmware products have addressed the following Kernel vulnerabilities.
Vulnerability Details
CVEID: CVE-2020-13974
DESCRIPTION: Linux Kernel could allow a local attacker to execute arbitrary code on the system, caused by an integer overflow in the drivers/tty/vt/keyboard.c. By sending a specially crafted request, an attacker could exploit this vulnerability to execute arbitrary code on the system.
CVSS Base score: 8.4
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/183251 for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
CVEID: CVE-2020-10732
DESCRIPTION: Linux Kernel could allow a local authenticated attacker to obtain sensitive information, caused by a flaw in the implementation of Userspace core dumps. By sending a specially crafted request, an attacker could exploit this vulnerability to obtain sensitive information or cause a program to crash.
CVSS Base score: 3.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/181554 for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)
CVEID: CVE-2020-14314
DESCRIPTION: Linux Kernel is vulnerable to a denial of service, caused by a memory out-of-bounds read flaw. By sending a specially crafted request, a local attacker could exploit this vulnerability to cause the system to crash.
CVSS Base score: 4
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/188395 for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
CVEID: CVE-2020-12770
DESCRIPTION: Linux Kernel is vulnerable to a denial of service, caused by an issue with sg_write lacks an sg_remove_request call in a certain failure case. By sending a specially-crafted request, a local attacker could exploit this vulnerability to cause a panic.
CVSS Base score: 6.2
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/181750 for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
Affected Products and Versions
Affected Product(s) | Version(s) |
G7028 | 7.6 |
G8316 | 7.9 |
G8052 | 7.11 |
G8264 | 7.11 |
G8332 | 7.7 |
G8264T | 7.9 |
G8124/G8124E | 7.11 |
G8264CS_SI_Fabric_Image | 7.8 |
G8264CS | 7.8 |
Remediation/Fixes
Firmware fix versions are available on Fix Central: http://www.ibm.com/support/fixcentral/
Product | Fix Version |
IBM RackSwitch G7028 (G7028_Image_7.6.7.0) | 7.6.7.0 |
IBM RackSwitch G8316 (G8316_Image_7.9.29.0) | 7.9.29.0 |
IBM RackSwitch G8052 (G8052_Image_7.11.19.0) | 7.11.19.0 |
IBM RackSwitch G8264 (G8264_Image_7.11.19.0) | 7.11.19.0 |
IBM RackSwitch G8332 (G8332_Image_7.7.35.0) | 7.7.35.0 |
IBM RackSwitch G8264T (G8264T_Image_7.9.29.0) | 7.9.29.0 |
IBM RackSwitch G8124/G8124E (G8124_G8124E_Image_7.11.19.0) | 7.11.19.0 |
G8264CS_SI_Fabric_Image - Bundle (G8264CS_SI_Fabric_Image_7.8.27.0) | 7.8.27.0 |
IBM RackSwitch G8264CS (G8264CS_Image_7.8.27.0) | 7.8.27.0 |
Workarounds and Mitigations
None
Get Notified about Future Security Bulletins
References
Change History
14 Dec 2020: Initial Publication
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
Disclaimer
Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.
Document Location
Worldwide
Was this topic helpful?
Document Information
Modified date:
15 December 2020
UID
ibm16382336