Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2019.2918 Multiple Vulnerabilities in the Linux kernel affect the IBM FlashSystem models V840 and V9000 5 August 2019 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: IBM FlashSystem V840 Publisher: IBM Operating System: Network Appliance Impact/Access: Denial of Service -- Remote/Unauthenticated Access Confidential Data -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2017-18017 CVE-2017-17449 Reference: ESB-2019.1089 ESB-2019.0570 ESB-2018.3848 ESB-2018.1971 Original Bulletin: http://www.ibm.com/support/docview.wss?uid=ibm10957179 - --------------------------BEGIN INCLUDED TEXT-------------------- Multiple Vulnerabilities in the Linux kernel affect the IBM FlashSystem models V840 and V9000 Product: IBM FlashSystem V840 Operating system(s): Platform Independent Reference #: 0957179 Security Bulletin Summary There are vulnerabilities in Java to which the IBM FlashSystem V840 and FlashSystem V9000 are susceptible (CVE-2017-18017 and CVE-2017-17449). An exploit of CVE-2017-18017 could allow a remote attacker to cause a denial of service condition. An exploit of CVE-2017-17449 could allow an attacker to obtain sensitive information. Vulnerability Details CVEID: CVE-2017-18017 DESCRIPTION: Linux Kernel is vulnerable to a denial of service, caused by a use-after-free flaw in the tcpmss_mangle_packet function in net/netfilter/ xt_TCPMSS.c. By leveraging the presence of xt_TCPMSS in an iptables action, a remote attacker could exploit this vulnerability to cause a denial of service condition. CVSS Base Score: 7.5 CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/ 137122 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) CVEID: CVE-2017-17449 DESCRIPTION: Linux Kernel could allow a local attacker to obtain sensitive information, caused by the failure to restrict observations of Netlink messages to a single net namespace when CONFIG_NLMON is enabled in the __netlink_deliver_tap_skb function in net/netlink/af_netlink.c. By leveraging the CAP_NET_ADMIN capability to sniff an nlmon interface for all Netlink activity on the system, an attacker could exploit this vulnerability to obtain sensitive information. CVSS Base Score: 6.2 CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/ 136106 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) Affected Products and Versions Storage Node machine type and models (MTMs) affected: o 9846-AE1 and 9848-AE1 o 9846-AE2 and 9848-AE2 o 9846-AE3 and 9848-AE3 Controller Node MTMs affected: o 9846-AC0 and9848-AC0 o 9846-AC1 and 9848-AC1 o 9846-AC2 and 9848-AC2 o 9846-AC3 and 9848-AC3 Supported storage node code versions which are affected o VRMFs prior to 1.4.8.2 o VRMFs prior to 1.5.2.5 o VRMFs prior to 1.6.1.0 Supported controller node code versions which are affected . VRMFs prior to 7.8.1.8 . VRMFs prior to 8.1.3.3 . VRMFs prior to 8.2.0.0 Remediation/Fixes +--------------------+------------------------------------+--------+-------------------------+ | | | | | | MTMs | VRMF | APAR | Remediation/First Fix | | | | | | +--------------------+------------------------------------+--------+-------------------------+ | | | | | | Storage nodes: | | | | | 9846-AE1,9848-AE1, | Code fixes are now available, the | | | | 9846-AE2, | minimum VRMF containing the fix | | | | 9848-AE2, | depends on the code stream: | | | | 9846-AE3, & | | | | | 9848-AE3 | Fixed Code VRMF | | FlashSystem V840 fixes | | | 1.6 stream: 1.6.1.0 | | or FlashSystem V9000 | | Controller nodes: | 1.5 stream: 1.5.2.5 | N/A | fixes for storage and | | 9846-AC0, | 1.4 stream: 1.4.8.2 | | controller node are | | 9846-AC1, | | | available @ IBM's Fix | | 9848-AC0, | Controller Node VRMF | | Central | | 9848-AC1, | 8.2 stream: 8.2.0.0 | | | | 9846-AC2, | 8.1 stream: 8.1.3.3 | | | | 9848-AC2, | 7.8 stream: 7.8.1.8 | | | | 9846-AC3, & | | | | | 9848-AC3 | | | | | | | | | +--------------------+------------------------------------+--------+-------------------------+ Workarounds and Mitigations Upgrade to a remediated code level. Acknowledgement None. Change History 28 June 2019 Original Version Published - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXUe5e2aOgq3Tt24GAQhDnA//VTpKYZHur/tSEMB+TlREypJyvfFHftFt gFXkebGmjP64XOItHcnEyIXJ28mnHVbjtHh8SHUKDRrzyFH8yHcTRbgjQQ9cKxKu H1N7dK1JFv4NsMepCBGAAwnWZj0aipQHADzE38fzK8IC0N6imhDR08GKtj/LWWph JKVfvJgHBOP1Yr/IpWLwYXtIGa8gMgPosD6wyLLmTkSy+4oE6xnhMK0DslIGhHVM Wj2nzn/9DFXs7f82t+qerewicFySyu6X39QH680r0XBjHpVVScpzcgF0cf87T8qK TGJpv2zErvZBAnCKaQZD7N9NHabjhJVZCOydmqKWnPmk6VE7s/ZnwLZWgKtFOGvg gBvi43K+K4D4++y+b/CF+YCIFQZ45kfHITTbpbIM64RiT7zKlUh5x3Xymb/SqLDh xSQX7hFYZDt5MbANlDy0hE+PeBQ35lDm9Ty18PFRoZGoonFw6kbm6PeQ+uinqeG0 Z64pa/hjOB3F7oHAwD5cKqX1MHyNDAfM7dwjbpL7qF0rbIAJ7gPbLyGh9Dc39BGK J4gjl6pnD2IozcEEw9WKzLaERYz9e2BBJCQTyg3pNg2noSUfVJ+/oi+jmqlYbx79 dnNO1vTw8DEjcq/wftY4EcvCn+r+Yn6PyWvfyajDJNP4PCwzTlfPSuvCAUD/aaVg 8zJ6weHRs6I= =ESLr -----END PGP SIGNATURE-----