Lucene search

K
ibmIBMDA9C002553002691B3119A5903DFF5774C9EB79E165915588755267A923F5EDF
HistoryJun 25, 2021 - 4:46 p.m.

Security Bulletin: IBM General Parallel File System is affected by security vulnerabilities (CVE-2015-0197, CVE-2015-0198, CVE-2015-0199)

2021-06-2516:46:35
www.ibm.com
9

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.006 Low

EPSS

Percentile

76.1%

Summary

Security vulnerabilities have been identified in current levels of GPFS V4.1, V3.5, and V3.4:
- could allow a local attacker which only has a non-privileged account to execute programs with root privileges (CVE-2015-0197)
- may not properly authenticate network requests and could allow an attacker to execute programs remotely with root privileges (CVE-2015-0198)
- allows attackers to cause kernel memory corruption by issuing specific ioctl calls to a character device provided by the mmfslinux kernel module and cause a denial of service (CVE-2015-0199)

Vulnerability Details

CVEID: CVE-2015-0197**
DESCRIPTION:** IBM General Parallel File System could allow a local attacker which only has a non-privileged account to execute programs with root privileges.
CVSS Base Score: 6.9
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/101224 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:L/AC:M/Au:N/C:C/I:C/A:C)

CVEID: CVE-2015-0198**
DESCRIPTION:** IBM General Parallel File System may not properly authenticate network requests and could allow an attacker to execute programs remotely with root privileges.
CVSS Base Score: 9.3
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/101225 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:C/I:C/A:C)

CVEID: CVE-2015-0199**
DESCRIPTION:** IBM General Parallel File System allows attackers to cause kernel memory corruption by issuing specific ioctl calls to a character device provided by the mmfslinux kernel module and cause a denial of service.
CVSS Base Score: 4.7
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/101226 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:L/AC:M/Au:N/C:N/I:N/A:C)

Affected Products and Versions

GPFS V4.1.0.0 thru GPFS V4.1.0.6

GPFS V3.5.0.0 thru GPFS V3.5.0.23

GPFSV3.4.0.0 thru GPFSV3.4.0.31

For CVE-2015-0198, you are not affected if either of the following are true:

  • the cipherList configuration variable is set to AUTHONLY or to a cipher
    or
  • only trusted nodes/processes/users can initiate connections to GPFS nodes

Remediation/Fixes

Apply GPFS 4.1.0.7 , GPFS V3.5.0.24 ,or GPFS V3.4.0.32 as appropriate for your level of GPFS available from Fix Central at <http://www-933.ibm.com/support/fixcentral/&gt; .

For CVE-2015-0198, after applying the appropriate PTF, set cipherList to AUTHONLY.

To enable AUTHONLY without shutting down the daemon on all nodes:

  • Install the PTF containing the fix on all nodes in the cluster one node at a time
  • Generate SSL keys by running the mmauth genkey new command. This step is not needed if CCR is in effect (GPFS 4.1 only)
  • Enable AUTHONLY by running the mmauth update . -l AUTHONLY command. If the** mmauth update**command fails, examine the messages, correct the problems (or shut down the daemon on the problem node) and repeat the mmauth update command above.

Note: Applying the PTF for your level of GPFS (GPFS 4.1.0.7 , GPFSV3.5.0.24 , or GPFS V3.4.0.32) on all nodes in the cluster will allow you to switch cipherList dynamically without shutting down the GPFS daemons across the cluster. The mitigation step below will require all nodes in the cluster to be shut down.

If there are any nodes running GPFS 3.4 on Windows then switching the cipherList dynamically is only possible in one of the following two scenarios:

  • The** mmauth update** command is initiated from one of the GPFS 3.4 Windows nodes
    or
  • If the command is issued from another node in the cluster then GPFS must be down on all the GPFS 3.4 Windows nodes

Workarounds and Mitigations

For CVE-2015-0197 and CVE-2015-0199, there are no workarounds or mitigations.

For CVE-2015-0198, set cipherList to AUTHONLY, or to a real cipher. Follow the instructions above if the PTF was installed on all the nodes in the cluster. Otherwise:

  • Generate SSL keys by running the mmauth genkey new command
  • Shut down the GPFS daemon on all nodes on the cluster
  • Enable AUTHONLY by running mmauth update . -l AUTHONLY

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.006 Low

EPSS

Percentile

76.1%

Related for DA9C002553002691B3119A5903DFF5774C9EB79E165915588755267A923F5EDF