Security vulnerabilities have been identified in current levels of GPFS V4.1, V3.5, and V3.4:
- could allow a local attacker which only has a non-privileged account to execute programs with root privileges (CVE-2015-0197)
- may not properly authenticate network requests and could allow an attacker to execute programs remotely with root privileges (CVE-2015-0198)
- allows attackers to cause kernel memory corruption by issuing specific ioctl calls to a character device provided by the mmfslinux kernel module and cause a denial of service (CVE-2015-0199)
CVEID: CVE-2015-0197**
DESCRIPTION:** IBM General Parallel File System could allow a local attacker which only has a non-privileged account to execute programs with root privileges.
CVSS Base Score: 6.9
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/101224 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:L/AC:M/Au:N/C:C/I:C/A:C)
CVEID: CVE-2015-0198**
DESCRIPTION:** IBM General Parallel File System may not properly authenticate network requests and could allow an attacker to execute programs remotely with root privileges.
CVSS Base Score: 9.3
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/101225 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVEID: CVE-2015-0199**
DESCRIPTION:** IBM General Parallel File System allows attackers to cause kernel memory corruption by issuing specific ioctl calls to a character device provided by the mmfslinux kernel module and cause a denial of service.
CVSS Base Score: 4.7
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/101226 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:L/AC:M/Au:N/C:N/I:N/A:C)
GPFS V4.1.0.0 thru GPFS V4.1.0.6
GPFS V3.5.0.0 thru GPFS V3.5.0.23
GPFSV3.4.0.0 thru GPFSV3.4.0.31
For CVE-2015-0198, you are not affected if either of the following are true:
Apply GPFS 4.1.0.7 , GPFS V3.5.0.24 ,or GPFS V3.4.0.32 as appropriate for your level of GPFS available from Fix Central at <http://www-933.ibm.com/support/fixcentral/> .
For CVE-2015-0198, after applying the appropriate PTF, set cipherList to AUTHONLY.
To enable AUTHONLY without shutting down the daemon on all nodes:
Note: Applying the PTF for your level of GPFS (GPFS 4.1.0.7 , GPFSV3.5.0.24 , or GPFS V3.4.0.32) on all nodes in the cluster will allow you to switch cipherList dynamically without shutting down the GPFS daemons across the cluster. The mitigation step below will require all nodes in the cluster to be shut down.
If there are any nodes running GPFS 3.4 on Windows then switching the cipherList dynamically is only possible in one of the following two scenarios:
For CVE-2015-0197 and CVE-2015-0199, there are no workarounds or mitigations.
For CVE-2015-0198, set cipherList to AUTHONLY, or to a real cipher. Follow the instructions above if the PTF was installed on all the nodes in the cluster. Otherwise: