IBM Support

Security Bulletin: IBM has released AIX and VIOS iFixes in response to the vulnerabilities known as Spectre and Meltdown.

Security Bulletin


IBM has released the following fixes for AIX and VIOS in response to CVE-2017-5715, CVE-2017-5753, and CVE-2017-5754.

Vulnerability Details

CVEID: CVE-2017-5715
CVEID: CVE-2017-5753
CVEID: CVE-2017-5754

iFixes released on August 17, 2018:
Updated AIX and VIOS fixes for CVE-2017-5715, known as Spectre, that are only applicable to some POWER9 systems are now available.
Please see Security Bulletin:

iFixes released on May 22, 2018:
AIX and VIOS fixes are now available for CVE-2018-3639.
Please see Security Bulletin:

Affected Products and Versions

AIX 5.3 (32-bit and 64-bit kernels), 6.1, 7.1, 7.2
VIOS 2.2.x

The vulnerabilities in the following filesets are being addressed:

key_fileset = aix

   Fileset                 Lower Level  Upper Level KEY
   ---------------------------------------------------------            key_w_fs
   bos.mp64         key_w_fs
   bos.mp64         key_w_fs
   bos.mp64          key_w_fs
   bos.mp64           key_w_fs
   bos.mp64           key_w_fs
   bos.mp64           key_w_fs
   bos.mp64           key_w_fs

To find out whether the affected filesets are installed on your systems, refer to the lslpp command found in AIX user's guide.

Example: lslpp -L | grep -i bos.mp64

Note: AIX or VIOS users of all fileset levels should continue to monitor their My Notifications alerts and the IBM PSIRT Blog for additional information about these vulnerabilities:

- My Notifications

- IBM PSIRT Blog - Potential Impact on Processors in the Power Family



IBM has assigned the following APARs to this problem:

   AIX Level APAR     Availability  SP   KEY
   5.3.12    IJ03029  N/A           N/A  key_w_apar
   6.1.9     IJ03030  **            SP11 key_w_apar
   7.1.4     IJ03032  **            SP6  key_w_apar
   7.1.5     IJ03033  **            SP2  key_w_apar
   7.2.0     IJ03034  **            SP6  key_w_apar
   7.2.1     IJ03035  **            SP4  key_w_apar
   7.2.2     IJ03036  **            SP2  key_w_apar

   VIOS Level APAR    Availability  SP   KEY
   2.2.4     IJ03030  **   key_w_apar
   2.2.5     IJ03030  **   key_w_apar
   2.2.6     IJ03030  **   key_w_apar

Subscribe to the APARs here:

By subscribing, you will receive periodic email alerting you to the status of the APAR, and a link to download the fix once it becomes available.


AIX and VIOS fixes are available.

IMPORTANT: Both the AIX/VIOS and FW fixes are required to address the vulnerabilities.

An LPAR system reboot is required to complete the iFix installation, or Live Update may be used on AIX 7.2 to avoid a reboot.

AIX and VIOS iFix Dependency:
The Power Firmware fix must be applied prior to the LPAR reboot (or Live Update) for the fix to be active. If the Power Firmware fix is applied after the patched AIX or VIOS LPAR has been rebooted (or Live Update completed), the fix must be activated by either:
1.  Performing an additional reboot of the AIX or VIOS LPAR
2.  Performing an LPAR migration to a destination frame that already has the Power Firmware fix applied.

Link to the related Power Firmware Security Bulletin and fix information:

The AIX/VIOS fixes can be downloaded via ftp or http from:

The link above is to a tar file containing this signed advisory, fix packages, and OpenSSL signatures for each package. The fixes below include prerequisite checking. This will enforce the correct mapping between the fixes and AIX Technology Levels.
   AIX Level  Interim Fix (*.Z)         KEY
-----------------   IJ03029m9c.180124.epkg.Z  key_w_fix   IJ03029m9a.180117.epkg.Z  key_w_fix   IJ03029m9b.180117.epkg.Z  key_w_fix    IJ03030m8a.180117.epkg.Z  key_w_fix    IJ03030m9a.180116.epkg.Z  key_w_fix   IJ03030mAa.180116.epkg.Z  key_w_fix    IJ03032m3a.180125.epkg.Z  key_w_fix    IJ03032m3b.180125.epkg.Z  key_w_fix    IJ03032m4a.180125.epkg.Z  key_w_fix    IJ03032m5a.180116.epkg.Z  key_w_fix    IJ03033m1a.180116.epkg.Z  key_w_fix    IJ03033m1a.180116.epkg.Z  key_w_fix    IJ03034m3a.180117.epkg.Z  key_w_fix    IJ03034m4a.180117.epkg.Z  key_w_fix    IJ03034m5a.180117.epkg.Z  key_w_fix    IJ03035m1a.180118.epkg.Z  key_w_fix    IJ03035m1b.180118.epkg.Z  key_w_fix    IJ03035m2a.180118.epkg.Z  key_w_fix    IJ03035m3a.180117.epkg.Z  key_w_fix    IJ03036m1a.180116.epkg.Z  key_w_fix    IJ03036m1a.180116.epkg.Z  key_w_

Please note that the above table refers to AIX TL/SP level as opposed to fileset level, i.e., is AIX 7200-02-01.

NOTE:  Multiple iFixes are provided for AIX 5300-12-09, 7100-04-03, and 7200-01-01.
IJ03029m9c is for AIX 5300-12-09 with fileset level
IJ03029m9a is for AIX 5300-12-09 with bos.mp64 fileset level
IJ03029m9b is for AIX 5300-12-09 with bos.mp64 fileset level
IJ03032m3a is for AIX 7100-04-03 with bos.mp64 fileset level
IJ03032m3b is for AIX 7100-04-03 with bos.mp64 fileset level
IJ03035m1a is for AIX 7200-01-01 with bos.mp64 fileset level 
IJ03035m1b is for AIX 7200-01-01 with bos.mp64 fileset level

   VIOS Level  Interim Fix (*.Z)         KEY
   -----------------------------------------------    IJ03030m8a.180117.epkg.Z  key_w_fix    IJ03030m9a.180116.epkg.Z  key_w_fix    IJ03030m9b.180116.epkg.Z  key_w_fix    IJ03030m8a.180117.epkg.Z  key_w_fix    IJ03030m9a.180116.epkg.Z  key_w_fix    IJ03030m9b.180116.epkg.Z  key_w_fix     IJ03030mAa.180116.epkg.Z  key_w_fix    IJ03030mAa.180116.epkg.Z  key_w_fix

To extract the fixes from the tar file:

   tar xvf spectre_meltdown_fix.tar
   cd spectre_meltdown_fix

Verify you have retrieved the fixes intact.

The checksums below were generated using the "openssl dgst -sha256 file" command as the following:

   openssl dgst -sha256                                              filename                 KEY
   d6ddda167a389195f6e48fb1868677e170f8f7ab679eb2af1e15f6672cd18e2e  IJ03029m9c.180124.epkg.Z key_w_csum
   11249eb38318b8779e5f86836edd2913278081e22d61ed68df207175bde6bd3a  IJ03029m9a.180117.epkg.Z key_w_csum
   b0cfe72d0d7de4f5f99cdcf802b1a298586b6f7511bcb63e9644008faa4b7353  IJ03029m9b.180117.epkg.Z key_w_csum

   043d6e933e98c5b45ec7f93e61d0fb9647575d309151f7f9f6a4c4d4bd7376b0  IJ03030m8a.180117.epkg.Z key_w_csum
   873d25f7743c52d75cff80d1343d638f1f406bff2f70b2b362670a56d7abf3cb  IJ03030m9a.180116.epkg.Z key_w_csum
   44834d4990a178c6773c7fbd6bc00fbc81b23944b9988329294ae0cbb93ec20f  IJ03030m9b.180116.epkg.Z key_w_csum
   f1fc5a1bb4daab5f9d2abc1006df087a688ed2832a7eb15a0de4f45efe94d6a6  IJ03030mAa.180116.epkg.Z key_w_csum

   61e8ecdf43a25b590697cc924940573a49adc639be381b05123dac0bb6cf6f9c  IJ03032m3a.180125.epkg.Z key_w_csum
   895f3e1f269f0ef2f4f8d4d2801642e408731f7e813b279e9dd6616f9975f154  IJ03032m3b.180125.epkg.Z key_w_csum
   09627d285a0fcd81d7eca4a23270457bd9bca2d3e104593f392a837cb7e1faa1  IJ03032m4a.180125.epkg.Z key_w_csum
   896215923b7d6001a5aff7ed7d420d9963bef177d88af1ef2b30d131e1c10029  IJ03032m5a.180116.epkg.Z key_w_csum
   48ba4ca0c38611852dcbfcfb25376025941285df77e629953bf9bc534815e3cd  IJ03033m1a.180116.epkg.Z key_w_csum

   eb1e9f32dd4c7072a05fc41b77f6de957d0812eb788747efb7d8f17573566277  IJ03034m3a.180117.epkg.Z key_w_csum
   64de96295eadae27b967dbd8a5c0c799b13bb4869edc63b970c470bfb820ce58  IJ03034m4a.180117.epkg.Z key_w_csum
   8d18635a490926c67e992ea0cff6fab853f451802a3172a6f7bfd1244fa81e5c  IJ03034m5a.180117.epkg.Z key_w_csum
   e7e2e4443f33f6449b4d0bfe9a649859dec540156621459662c1f96149c61cb2  IJ03035m1a.180118.epkg.Z key_w_csum
   5d4feacb66f678458df8f0ad053b5c1e64868c6e61debff08c175219efa0b415  IJ03035m1b.180118.epkg.Z key_w_csum
   f89f04a4586ac847fa31cf240448be5221f17783fc3b1a574c894a6dcb727424  IJ03035m2a.180118.epkg.Z key_w_csum
   ed4f1af7ddd8a8f679ea1c6de410ad53c3b63d3c0b6c15561bbccea4f4837232  IJ03035m3a.180117.epkg.Z key_w_csum
   b1c4f488d6084eb7df5e68af3195d5f167f0d17dbb7c0290d9db4646fdd6c06a  IJ03036m1a.180116.epkg.Z key_w_csum

These sums should match exactly. The OpenSSL signatures in the tar file and on this advisory can also be used to verify the integrity of the fixes. If the sums or signatures cannot be confirmed, contact IBM Support at and describe the discrepancy.

   openssl dgst -sha1 -verify [pubkey_file] -signature [advisory_file].sig [advisory_file]

   openssl dgst -sha1 -verify [pubkey_file] -signature [ifix_file].sig [ifix_file]

Published advisory OpenSSL signature file location:


Workarounds and Mitigations


Get Notified about Future Security Bulletins




The vulnerability was reported to IBM by Google Project Zero.

Change History

Updated: Fri Feb 9 14:32:35 CST 2018
Update: Clarified reboot requirements and firmware dependencies for the AIX and VIOS iFixes. Refer to the FIXES section for these changes. Additional iFixes are now available. Additional iFixes are now available for:
AIX 5300-12-09, 32-bit kernel version
AIX 6100-09-08 and 6100-09-09
AIX 7100-04-03 and 7100-04-04
AIX 7200-00-03 and 7200-00-04
AIX 7200-01-01 and 7200-01-02
VIOS and
VIOS and
Updated: <date to be entered>
Update: Added a link to the bulletin for CVE-2017-5715, known as Spectre, regarding updated iFixes that are only applicable to some POWER9 systems.
The bulletin is available here:

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.


According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY. In addition to other efforts to address potential vulnerabilities, IBM periodically updates the record of components contained in our product offerings. As part of that effort, if IBM identifies previously unidentified packages in a product/service inventory, we address relevant vulnerabilities regardless of CVE date. Inclusion of an older CVEID does not demonstrate that the referenced product has been used by IBM since that date, nor that IBM was aware of a vulnerability as of that date. We are making clients aware of relevant vulnerabilities as we become aware of them. "Affected Products and Versions" referenced in IBM Security Bulletins are intended to be only products and versions that are supported by IBM and have not passed their end-of-support or warranty date. Thus, failure to reference unsupported or extended-support products and versions in this Security Bulletin does not constitute a determination by IBM that they are unaffected by the vulnerability. Reference to one or more unsupported versions in this Security Bulletin shall not create an obligation for IBM to provide fixes for any unsupported or extended-support products or versions.

[{"Product":{"code":"SWG10","label":"AIX"},"Business Unit":{"code":"BU058","label":"IBM Infrastructure w\/TPS"},"Component":"--","Platform":[{"code":"PF002","label":"AIX"}],"Version":"5.3;6.1;7.1;7.2","Edition":"Enterprise;Standard","Line of Business":{"code":"LOB08","label":"Cognitive Systems"}},{"Product":{"code":"SWG10","label":"AIX"},"Business Unit":{"code":"BU058","label":"IBM Infrastructure w\/TPS"},"Component":" ","Platform":[{"code":"","label":""}],"Version":"","Edition":"","Line of Business":{"code":"LOB08","label":"Cognitive Systems"}},{"Product":{"code":"SWG10","label":"AIX"},"Business Unit":{"code":"BU058","label":"IBM Infrastructure w\/TPS"},"Component":" ","Platform":[{"code":"","label":""}],"Version":"","Edition":"","Line of Business":{"code":"LOB08","label":"Cognitive Systems"}},{"Product":{"code":"SWG10","label":"AIX"},"Business Unit":{"code":"BU058","label":"IBM Infrastructure w\/TPS"},"Component":" ","Platform":[{"code":"","label":""}],"Version":"","Edition":"","Line of Business":{"code":"LOB08","label":"Cognitive Systems"}}]

Document Information

Modified date:
15 September 2021