Security Bulletin
Summary
Intel(R) Manycore Platform Software Stack (Intel(R) MPSS) for Linux and Windows have addressed the following vulnerabilities in Linux Kernel.
Vulnerability Details
Summary
Intel® Manycore Platform Software Stack (Intel® MPSS) for Linux and Windows have addressed the following vulnerabilities in Linux Kernel.
Vulnerability Details
CVEID: CVE-2017-17450
Description: Linux Kernel could allow a local attacker to bypass security restrictions, caused by the failure to require the CAP_NET_ADMIN capability for add_callback and remove_callback operations in net/netfilter/xt_osf.c. By sending a specially-crafted request, an attacker could exploit this vulnerability to bypass intended access restrictions.
CVSS Base Score: 6.2
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/136107
for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N)
CVEID: CVE-2017-17052
Description: Linux Kernel could allow a local attacker to execute arbitrary code on the system, caused by a use-after-free in the mm_init function in kernel/fork.c. An attacker could exploit this vulnerability to execute arbitrary code on the system.
CVSS Base Score: 8.4
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/135701
for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
CVEID: CVE-2017-15951
Description: Linux Kernel is vulnerable to a denial of service, caused by a race condition in the KEYS subsystem. By using specially-crafted system calls, a local authenticated attacker could exploit this vulnerability to cause a denial of service condition.
CVSS Base Score: 5.5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/134189
for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)
CVEID: CVE-2017-15115
Description: Linux Kernel is vulnerable to a denial of service, caused by a use-after-free in the sctp_do_peeloff function in net/sctp/socket.c. By using specially-crafted system calls, a local attacker could exploit this vulnerability to cause the system to crash.
CVSS Base Score: 4
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/135068
for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
CVEID: CVE-2017-8824
Description: Linux Kernel could allow a local attacker to gain elevated privileges on the system, caused by a use-after-free in the dccp_disconnect function in net/dccp/proto.c. By using a specially-crafted system call, an attacker could exploit this vulnerability to gain privileges or cause a denial of service.
CVSS Base Score: 5.9
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/135913
for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Affected Products and Versions
The following products used with Intel Xeon Phi PCI-Express cards (Intel Xeon Phi 3120A, Intel Xeon Phi 5110P, Intel Xeon Phi 7120A, and Intel Xeon Phi 7210P) on the System x systems:
- iDataPlex dx360 M4
- NeXtScale nx360 M4
- PureFlex x220 M4 / x240 M4 / x240 M5
- x3850 X6 / x3950 X6
| Product | Version |
|---|---|
| Intel® Manycore Platform Software Stack (MPSS) for Linux & Windows | 3.8 |
Remediation/Fixes
IBM recommends that you update the affected versions of Intel MPSS that are used with the Intel Xeon Phi cards supported in IBM System x Servers to MPSS version 3.8.4 or later.
Instructions on how to download and apply the update are available at: https://software.intel.com/en-us/articles/intel-manycore-platform-software-stack-mpss
| Product | Fixed Version |
|---|---|
| Intel® Manycore Platform Software Stack (MPSS) for Linux & Windows | 3.8.4 |
Workarounds and Mitigations
None.
References
Related Information
IBM
Secure Engineering Web Portal
IBM Product Security
Incident Response Blog
Lenovo
Product Security Advisories
Acknowledgement
None.
Change History
15 May, 2018: Original Version Published
* The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
Disclaimer
According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.
Get Notified about Future Security Bulletins
References
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
Disclaimer
Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.
Document Location
Worldwide
Was this topic helpful?
Document Information
Modified date:
30 January 2019
UID
ibm1MIGR-5099805