Security Bulletin
Summary
Security vulnerabilities have been identified in the current levels of IBM GPFS as used by the TS7700:
- could allow a local non privileged attacker to execute commands with root privileges (CVE-2015-4974)
- could allow a local non privileged attacker to read system memory contents (CVE-2015-4981)
Vulnerability Details
CVEID: CVE-2015-4974
DESCRIPTION: IBM General Parallel File System could allow a local non privileged attacker to execute commands with root privileges.
CVSS Base Score: 8.4
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/105789 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
CVEID: CVE-2015-4981
DESCRIPTION: IBM General Parallel File System could allow a local non privileged attacker to read system memory contents
CVSS Base Score: 4
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/105831 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
Affected Products and Versions
All versions of microcode for the IBM Virtualization Engine TS7700 (3957-V06, 3957-V07, 3957-VEA, 3957-VEB) in releases R3.0 and R3.1 are affected. In addition, microcode versions of releases R3.2 and R3.3 prior to and including the following are also affected:
|
Release | Version |
| R3.3 | 8.33.0.45 |
| R3.2 | 8.32.2.1 |
Remediation/Fixes
Contact IBM Service at 1-800-IBM-SERV to arrange an upgrade to the latest microcode level followed by the installation of vtd_exec.229. Minimum microcode levels are shown below:
|
Release | Fix |
| R3.3 | Upgrade to 8.33.0.45 or later + vtd_exec.229 |
| R3.2 | Upgrade to 8.32.2.1 or 8.32.1.8 or later + vtd_exec.229 |
| R3.0 or R3.1 | Upgrade to 8.32.2.1 or later + vtd_exec.229 |
Please note that vtd_exec packages carry their own internal version numbers. For the vulnerabilities reported in this Security Bulletin, the minimum required vtd_exec version is as follows:
| Package | Version |
| vtd_exec.229 | 2.0 |
Workarounds and Mitigations
Although IBM recommends that you upgrade to the fixes identified above, you can mitigate, but not eliminate the risk of these vulnerabilities by restricting physical and network access to the TS7700 to authorized users and IBM Service Personnel only.
Get Notified about Future Security Bulletins
References
Change History
12 February 2016: Original Version Published
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
Disclaimer
Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.
Was this topic helpful?
Document Information
Modified date:
17 June 2018
UID
ssg1S1005573