Lucene search

K
ibmIBMF2696996C69A5751062743EFA39DF2BC8DF42C1F7765DFE2A40BB76DEE41AD49
HistoryOct 07, 2019 - 2:35 p.m.

Security Bulletin: A vulnerability has been identified in IBM Spectrum Scale where the local attacker can obtain root privilege by injecting parameters into setuid files (CVE-2019-4558)

2019-10-0714:35:20
www.ibm.com
14

0.0004 Low

EPSS

Percentile

5.1%

Summary

A security vulnerability has been identified in all levels of IBM Spectrum Scale that could allow one to obtain root privilege by injecting parameters into setuid files. A fix for this vulnerability is available.

Vulnerability Details

CVEID: CVE-2019-4558 DESCRIPTION: A security vulnerability has been identified in all levels of IBM Spectrum Scale (GPFS) that could allow a local attacker to obtain root privilege by injecting parameters into setuid files.
CVSS Base Score: 8.1
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/166282&gt; for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)

Affected Products and Versions

IBM Spectrum Scale V5.0.0.0 through V5.0.3.2

IBM Spectrum Scale V4.2.0.0 through V4.2.3.17

Remediation/Fixes

For IBM Spectrum Scale V5.0.0.0 through 5.0.3.2, apply V5.0.3.3 available from FixCentral at:

https://www-945.ibm.com/support/fixcentral/swg/selectFixes?product=ibm/StorageSoftware/IBM+Spectrum+Scale&function=fixid&fixids=Spectrum_Scale_Advanced-5.0.3.3-x86_64-Linux

For IBM Spectrum Scale V4.2.0.0 through V4.2.3.17, apply V4.2.3.18 available from FixCentral at:
https://www-945.ibm.com/support/fixcentral/swg/selectFixes?parent=Software%20defined%20storage&product=ibm/StorageSoftware/IBM+Spectrum+Scale&release=4.2.3&platform=All&function=all

If you cannot apply the latest level of service, contact IBM Service for an efix:

- For IBM Spectrum Scale V5.0.0.0 through V5.0.3.2, reference APAR IJ18477

- For IBM Spectrum Scale V4.2.0.0 through V4.2.3.17, reference APAR IJ18518

To contact IBM Service, see http://www.ibm.com/planetwide/

Workarounds and Mitigations

Until the fixes can be applied, a workaround is to remove the setuid from the files in the /usr/lpp/mmfs/bin directory. Determine the set of files with setuid bit by running

ls -l /usr/lpp/mmfs/bin | grep r-s

Then reset the setuid bit for each such file by issuing this command on each file

chmod u-sfile

Once the workaround is applied, a number of commands may no longer work when not invoked by unprivileged users, including:

mmchfileset mmcrsnapshot mmdelsnapshot mmdf mmedquota mmgetacl mmlsdisk mmlsfileset mmlsfs mmlsmgr mmlspolicy mmlspool mmlsquota mmlssnapshot mmputacl mmsnapdir

CPENameOperatorVersion
ibm spectrum scaleeqany

0.0004 Low

EPSS

Percentile

5.1%

Related for F2696996C69A5751062743EFA39DF2BC8DF42C1F7765DFE2A40BB76DEE41AD49