-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2019.2918
        Multiple Vulnerabilities in the Linux kernel affect the IBM
                     FlashSystem models V840 and V9000
                               5 August 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM FlashSystem V840
Publisher:         IBM
Operating System:  Network Appliance
Impact/Access:     Denial of Service        -- Remote/Unauthenticated
                   Access Confidential Data -- Existing Account      
Resolution:        Patch/Upgrade
CVE Names:         CVE-2017-18017 CVE-2017-17449 

Reference:         ESB-2019.1089
                   ESB-2019.0570
                   ESB-2018.3848
                   ESB-2018.1971

Original Bulletin: 
   http://www.ibm.com/support/docview.wss?uid=ibm10957179

- --------------------------BEGIN INCLUDED TEXT--------------------

Multiple Vulnerabilities in the Linux kernel affect the IBM FlashSystem models
V840 and V9000

Product:             IBM FlashSystem V840
Operating system(s): Platform Independent
Reference #:         0957179

Security Bulletin

Summary

There are vulnerabilities in Java to which the IBM FlashSystem V840 and
FlashSystem V9000 are susceptible (CVE-2017-18017 and CVE-2017-17449). An
exploit of CVE-2017-18017 could allow a remote attacker to cause a denial of
service condition. An exploit of CVE-2017-17449 could allow an attacker to
obtain sensitive information.

Vulnerability Details

CVEID: CVE-2017-18017
DESCRIPTION: Linux Kernel is vulnerable to a denial of service, caused by a
use-after-free flaw in the tcpmss_mangle_packet function in net/netfilter/
xt_TCPMSS.c. By leveraging the presence of xt_TCPMSS in an iptables action, a
remote attacker could exploit this vulnerability to cause a denial of service
condition.
CVSS Base Score: 7.5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
137122 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID: CVE-2017-17449
DESCRIPTION: Linux Kernel could allow a local attacker to obtain sensitive
information, caused by the failure to restrict observations of Netlink messages
to a single net namespace when CONFIG_NLMON is enabled in the
__netlink_deliver_tap_skb function in net/netlink/af_netlink.c. By leveraging
the CAP_NET_ADMIN capability to sniff an nlmon interface for all Netlink
activity on the system, an attacker could exploit this vulnerability to obtain
sensitive information.
CVSS Base Score: 6.2
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
136106 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)

Affected Products and Versions

Storage Node machine type and models (MTMs) affected:

  o 9846-AE1 and 9848-AE1
  o 9846-AE2 and 9848-AE2
  o 9846-AE3 and 9848-AE3

Controller Node MTMs affected:

  o 9846-AC0 and9848-AC0
  o 9846-AC1 and 9848-AC1
  o 9846-AC2 and 9848-AC2
  o 9846-AC3 and 9848-AC3

Supported storage node code versions which are affected

  o VRMFs prior to 1.4.8.2
  o VRMFs prior to 1.5.2.5
  o VRMFs prior to 1.6.1.0

Supported controller node code versions which are affected
. VRMFs prior to 7.8.1.8
. VRMFs prior to 8.1.3.3
. VRMFs prior to 8.2.0.0

Remediation/Fixes

+--------------------+------------------------------------+--------+-------------------------+
|                    |                                    |        |                         |
| MTMs               |                VRMF                | APAR   | Remediation/First Fix   |
|                    |                                    |        |                         |
+--------------------+------------------------------------+--------+-------------------------+
|                    |                                    |        |                         |
| Storage nodes:     |                                    |        |                         |
| 9846-AE1,9848-AE1, | Code fixes are now available, the  |        |                         |
| 9846-AE2,          | minimum VRMF containing the fix    |        |                         |
| 9848-AE2,          | depends on the code stream:        |        |                         |
| 9846-AE3, &        |                                    |        |                         |
| 9848-AE3           | Fixed Code VRMF                    |        | FlashSystem V840 fixes  |
|                    | 1.6 stream: 1.6.1.0                |        | or FlashSystem V9000    |
| Controller nodes:  | 1.5 stream: 1.5.2.5                | N/A    | fixes for storage and   |
| 9846-AC0,          | 1.4 stream: 1.4.8.2                |        | controller node are     |
| 9846-AC1,          |                                    |        | available @ IBM's Fix   |
| 9848-AC0,          | Controller Node VRMF               |        | Central                 |
| 9848-AC1,          | 8.2 stream: 8.2.0.0                |        |                         |
| 9846-AC2,          | 8.1 stream: 8.1.3.3                |        |                         |
| 9848-AC2,          | 7.8 stream: 7.8.1.8                |        |                         |
| 9846-AC3, &        |                                    |        |                         |
| 9848-AC3           |                                    |        |                         |
|                    |                                    |        |                         |
+--------------------+------------------------------------+--------+-------------------------+

Workarounds and Mitigations

Upgrade to a remediated code level.

Acknowledgement

None.

Change History

28 June 2019 Original Version Published

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=ESLr
-----END PGP SIGNATURE-----