spectre_meltdown_advisory.asc: Version 2

IBM SECURITY ADVISORY

First Issued: Thu Jan 25 08:15:51 CST 2018
|Updated: Fri Feb 9 14:32:35 CST 2018
|Update: Clarified reboot requirements and firmware dependencies for the AIX
| and VIOS iFixes. Refer to the FIXES section for these changes.
| Additional iFixes are now available. Additional iFixes are now available
| for:
| AIX 5300-12-09, 32-bit kernel version
| AIX 6100-09-08 and 6100-09-09
| AIX 7100-04-03 and 7100-04-04
| AIX 7200-00-03 and 7200-00-04
| AIX 7200-01-01 and 7200-01-02
| VIOS 2.2.4.30 and 2.2.4.40
| VIOS 2.2.5.10 and 2.2.5.20
| VIOS 2.2.6.0

The most recent version of this document is available here:

http://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_advisory.asc
https://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_advisory.asc
ftp://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_advisory.asc

Security Bulletin: IBM has released AIX and VIOS iFixes in response to the
vulnerabilities known as Spectre and Meltdown.

===============================================================================

SUMMARY:

IBM has released the following fixes for AIX and VIOS in response to
CVE-2017-5715, CVE-2017-5753, and CVE-2017-5754.

===============================================================================

VULNERABILITY DETAILS:

CVEID: CVE-2017-5715
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715

CVEID: CVE-2017-5753
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753

CVEID: CVE-2017-5754
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754

AFFECTED PRODUCTS AND VERSIONS:

| AIX 5.3 (32-bit and 64-bit kernels), 6.1, 7.1, 7.2
VIOS 2.2.x

The vulnerabilities in the following filesets are being addressed:

key_fileset = aix

Fileset Lower Level Upper Level KEY
———————————————————
| bos.mp 5.3.12.0 5.3.12.9 key_w_fs
bos.mp64 5.3.12.0 5.3.12.10 key_w_fs
| bos.mp64 6.1.9.0 6.1.9.300 key_w_fs
bos.mp64 7.1.4.0 7.1.4.33 key_w_fs
bos.mp64 7.1.5.0 7.1.5.0 key_w_fs
bos.mp64 7.2.0.0 7.2.0.5 key_w_fs
bos.mp64 7.2.1.0 7.2.1.4 key_w_fs
bos.mp64 7.2.2.0 7.2.2.0 key_w_fs

To find out whether the affected filesets are installed
on your systems, refer to the lslpp command found in AIX user’s guide.

Example: lslpp -L | grep -i bos.mp64

Note: AIX or VIOS users of all fileset levels should continue to monitor
their My Notifications alerts and the IBM PSIRT Blog for additional
information about these vulnerabilities:

– My Notifications
http://www.ibm.com/support/mynotifications

– IBM PSIRT Blog – Potential Impact on Processors in the Power Family

Potential Impact on Processors in the POWER Family

REMEDIATION:

A. APARS

IBM has assigned the following APARs to this problem:

AIX Level APAR Availability SP KEY
————————————————
5.3.12 IJ03029 N/A N/A key_w_apar
6.1.9 IJ03030 ** SP11 key_w_apar
7.1.4 IJ03032 ** SP6 key_w_apar
7.1.5 IJ03033 ** SP2 key_w_apar
7.2.0 IJ03034 ** SP6 key_w_apar
7.2.1 IJ03035 ** SP4 key_w_apar
7.2.2 IJ03036 ** SP2 key_w_apar

| VIOS Level APAR Availability SP KEY
| ————————————————
| 2.2.4 IJ03030 ** 2.2.4.60 key_w_apar
| 2.2.5 IJ03030 ** 2.2.5.40 key_w_apar
| 2.2.6 IJ03030 ** 2.2.6.20 key_w_apar

Subscribe to the APARs here:

http://www.ibm.com/support/docview.wss?uid=isg1IJ03032
http://www.ibm.com/support/docview.wss?uid=isg1IJ03033
http://www.ibm.com/support/docview.wss?uid=isg1IJ03034
http://www.ibm.com/support/docview.wss?uid=isg1IJ03035
http://www.ibm.com/support/docview.wss?uid=isg1IJ03036

https://www.ibm.com/support/docview.wss?uid=isg1IJ03032
https://www.ibm.com/support/docview.wss?uid=isg1IJ03033
https://www.ibm.com/support/docview.wss?uid=isg1IJ03034
https://www.ibm.com/support/docview.wss?uid=isg1IJ03035
https://www.ibm.com/support/docview.wss?uid=isg1IJ03036

By subscribing, you will receive periodic email alerting you
to the status of the APAR, and a link to download the fix once
it becomes available.

B. FIXES

AIX and VIOS fixes are available.

IMPORTANT: Both the AIX/VIOS and FW fixes are required to address
the vulnerabilities.

| An LPAR system reboot is required to complete the iFix installation,
| or Live Update may be used on AIX 7.2 to avoid a reboot.

| AIX and VIOS iFix Dependency:
| The Power Firmware fix must be applied prior to the LPAR reboot
| (or Live Update) for the fix to be active. If the Power Firmware
| fix is applied after the patched AIX or VIOS LPAR has been rebooted
| (or Live Update completed), the fix must be activated by either:

| 1. Performing an additional reboot of the AIX or VIOS LPAR
| or
| 2. Performing an LPAR migration to a destination frame that already
| has the Power Firmware fix applied.

Link to the related Power Firmware Security Bulletin and fix
information:
http://www-01.ibm.com/support/docview.wss?uid=isg3T1026811

The AIX/VIOS fixes can be downloaded via ftp or http from:

ftp://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_fix.tar
http://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_fix.tar
https://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_fix.tar

The link above is to a tar file containing this signed
advisory, fix packages, and OpenSSL signatures for each package.
The fixes below include prerequisite checking. This will
enforce the correct mapping between the fixes and AIX
Technology Levels.

AIX Level Interim Fix (*.Z) KEY
———————————————-
| 5.3.12.9 IJ03029m9c.180124.epkg.Z key_w_fix
5.3.12.9 IJ03029m9a.180117.epkg.Z key_w_fix
5.3.12.9 IJ03029m9b.180117.epkg.Z key_w_fix
| 6.1.9.8 IJ03030m8a.180117.epkg.Z key_w_fix
| 6.1.9.9 IJ03030m9a.180116.epkg.Z key_w_fix
6.1.9.10 IJ03030mAa.180116.epkg.Z key_w_fix
| 7.1.4.3 IJ03032m3a.180125.epkg.Z key_w_fix
| 7.1.4.3 IJ03032m3b.180125.epkg.Z key_w_fix
| 7.1.4.4 IJ03032m4a.180125.epkg.Z key_w_fix
7.1.4.5 IJ03032m5a.180116.epkg.Z key_w_fix
7.1.5.0 IJ03033m1a.180116.epkg.Z key_w_fix
7.1.5.1 IJ03033m1a.180116.epkg.Z key_w_fix
| 7.2.0.3 IJ03034m3a.180117.epkg.Z key_w_fix
| 7.2.0.4 IJ03034m4a.180117.epkg.Z key_w_fix
7.2.0.5 IJ03034m5a.180117.epkg.Z key_w_fix
| 7.2.1.1 IJ03035m1a.180118.epkg.Z key_w_fix
| 7.2.1.1 IJ03035m1b.180118.epkg.Z key_w_fix
| 7.2.1.2 IJ03035m2a.180118.epkg.Z key_w_fix
7.2.1.3 IJ03035m3a.180117.epkg.Z key_w_fix
7.2.2.0 IJ03036m1a.180116.epkg.Z key_w_fix
7.2.2.1 IJ03036m1a.180116.epkg.Z key_w_fix

Please note that the above table refers to AIX TL/SP level as
opposed to fileset level, i.e., 7.2.2.1 is AIX 7200-02-01.

| NOTE: Multiple iFixes are provided for AIX 5300-12-09,
| 7100-04-03, and 7200-01-01.
| IJ03029m9c is for AIX 5300-12-09 with bos.mp fileset level 5.3.12.9.
IJ03029m9a is for AIX 5300-12-09 with bos.mp64 fileset level 5.3.12.9.
IJ03029m9b is for AIX 5300-12-09 with bos.mp64 fileset level 5.3.12.10.
| IJ03032m3a is for AIX 7100-04-03 with bos.mp64 fileset level 7.1.4.30.
| IJ03032m3b is for AIX 7100-04-03 with bos.mp64 fileset level 7.1.4.31.
| IJ03035m1a is for AIX 7200-01-01 with bos.mp64 fileset level 7.2.1.1.
| IJ03035m1b is for AIX 7200-01-01 with bos.mp64 fileset level 7.2.1.2.

Please reference the Affected Products and Version section above
for help with checking installed fileset levels.

VIOS Level Interim Fix (*.Z) KEY
———————————————–
| 2.2.4.30 IJ03030m8a.180117.epkg.Z key_w_fix
| 2.2.4.40 IJ03030m9a.180116.epkg.Z key_w_fix
2.2.4.50 IJ03030m9b.180116.epkg.Z key_w_fix
| 2.2.5.10 IJ03030m8a.180117.epkg.Z key_w_fix
| 2.2.5.20 IJ03030m9a.180116.epkg.Z key_w_fix
2.2.5.30 IJ03030m9b.180116.epkg.Z key_w_fix
| 2.2.6.0 IJ03030mAa.180116.epkg.Z key_w_fix
2.2.6.10 IJ03030mAa.180116.epkg.Z key_w_fix

To extract the fixes from the tar file:

tar xvf spectre_meltdown_fix.tar
cd spectre_meltdown_fix

Verify you have retrieved the fixes intact:

The checksums below were generated using the
“openssl dgst -sha256 file” command as the following:

openssl dgst -sha256 filename KEY
—————————————————————————————————–
| d6ddda167a389195f6e48fb1868677e170f8f7ab679eb2af1e15f6672cd18e2e IJ03029m9c.180124.epkg.Z key_w_csum
11249eb38318b8779e5f86836edd2913278081e22d61ed68df207175bde6bd3a IJ03029m9a.180117.epkg.Z key_w_csum
b0cfe72d0d7de4f5f99cdcf802b1a298586b6f7511bcb63e9644008faa4b7353 IJ03029m9b.180117.epkg.Z key_w_csum
| 043d6e933e98c5b45ec7f93e61d0fb9647575d309151f7f9f6a4c4d4bd7376b0 IJ03030m8a.180117.epkg.Z key_w_csum
| 873d25f7743c52d75cff80d1343d638f1f406bff2f70b2b362670a56d7abf3cb IJ03030m9a.180116.epkg.Z key_w_csum
44834d4990a178c6773c7fbd6bc00fbc81b23944b9988329294ae0cbb93ec20f IJ03030m9b.180116.epkg.Z key_w_csum
f1fc5a1bb4daab5f9d2abc1006df087a688ed2832a7eb15a0de4f45efe94d6a6 IJ03030mAa.180116.epkg.Z key_w_csum
| 61e8ecdf43a25b590697cc924940573a49adc639be381b05123dac0bb6cf6f9c IJ03032m3a.180125.epkg.Z key_w_csum
| 895f3e1f269f0ef2f4f8d4d2801642e408731f7e813b279e9dd6616f9975f154 IJ03032m3b.180125.epkg.Z key_w_csum
| 09627d285a0fcd81d7eca4a23270457bd9bca2d3e104593f392a837cb7e1faa1 IJ03032m4a.180125.epkg.Z key_w_csum
896215923b7d6001a5aff7ed7d420d9963bef177d88af1ef2b30d131e1c10029 IJ03032m5a.180116.epkg.Z key_w_csum
48ba4ca0c38611852dcbfcfb25376025941285df77e629953bf9bc534815e3cd IJ03033m1a.180116.epkg.Z key_w_csum
| eb1e9f32dd4c7072a05fc41b77f6de957d0812eb788747efb7d8f17573566277 IJ03034m3a.180117.epkg.Z key_w_csum
| 64de96295eadae27b967dbd8a5c0c799b13bb4869edc63b970c470bfb820ce58 IJ03034m4a.180117.epkg.Z key_w_csum
8d18635a490926c67e992ea0cff6fab853f451802a3172a6f7bfd1244fa81e5c IJ03034m5a.180117.epkg.Z key_w_csum
| e7e2e4443f33f6449b4d0bfe9a649859dec540156621459662c1f96149c61cb2 IJ03035m1a.180118.epkg.Z key_w_csum
| 5d4feacb66f678458df8f0ad053b5c1e64868c6e61debff08c175219efa0b415 IJ03035m1b.180118.epkg.Z key_w_csum
| f89f04a4586ac847fa31cf240448be5221f17783fc3b1a574c894a6dcb727424 IJ03035m2a.180118.epkg.Z key_w_csum
ed4f1af7ddd8a8f679ea1c6de410ad53c3b63d3c0b6c15561bbccea4f4837232 IJ03035m3a.180117.epkg.Z key_w_csum
b1c4f488d6084eb7df5e68af3195d5f167f0d17dbb7c0290d9db4646fdd6c06a IJ03036m1a.180116.epkg.Z key_w_csum

These sums should match exactly. The OpenSSL signatures in the tar
file and on this advisory can also be used to verify the
integrity of the fixes. If the sums or signatures cannot be
confirmed, contact IBM Support at
http://ibm.com/support/ and describe the discrepancy.

openssl dgst -sha1 -verify [pubkey_file] -signature [advisory_file].sig [advisory_file]

openssl dgst -sha1 -verify [pubkey_file] -signature [ifix_file].sig [ifix_file]

Published advisory OpenSSL signature file location:

http://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_advisory.asc.sig
https://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_advisory.asc.sig
ftp://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_advisory.asc.sig

C. FIX AND INTERIM FIX INSTALLATION

IMPORTANT: Both the AIX/VIOS and FW fixes are required to address
the vulnerabilities.

| An LPAR system reboot is required to complete the iFix installation,
| or Live Update may be used on AIX 7.2 to avoid a reboot.

| AIX and VIOS iFix Dependency:
| The Power Firmware fix must be applied prior to the LPAR reboot
| (or Live Update) for the fix to be active. If the Power Firmware
| fix is applied after the patched AIX or VIOS LPAR has been rebooted
| (or Live Update completed), the fix must be activated by either:

| 1. Performing an additional reboot of the AIX or VIOS LPAR
| or
| 2. Performing an LPAR migration to a destination frame that already
| has the Power Firmware fix applied.

Link to the related Power Firmware Security Bulletin and fix
information:
http://www-01.ibm.com/support/docview.wss?uid=isg3T1026811

If possible, it is recommended that a mksysb backup of the system
be created. Verify it is both bootable and readable before
proceeding.

To preview a fix installation:

installp -a -d fix_name -p all # where fix_name is the name of the
# fix package being previewed.
To install a fix package:

installp -a -d fix_name -X all # where fix_name is the name of the
# fix package being installed.

Interim fixes have had limited functional and regression
testing but not the full regression testing that takes place
for Service Packs; however, IBM does fully support them.

Interim fix management documentation can be found at:

http://www14.software.ibm.com/webapp/set2/sas/f/aix.efixmgmt/home.html

To preview an interim fix installation:

emgr -e ipkg_name -p # where ipkg_name is the name of the
# interim fix package being previewed.

To install an interim fix package:

emgr -e ipkg_name -X # where ipkg_name is the name of the
# interim fix package being installed.

WORKAROUNDS AND MITIGATIONS:

None.

===============================================================================

CONTACT US:

Note: Keywords labeled as KEY in this document are used for parsing
purposes.

If you would like to receive AIX Security Advisories via email,
please visit “My Notifications”:

http://www.ibm.com/support/mynotifications

To view previously issued advisories, please visit:

http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq

Contact IBM Support for questions related to this announcement:

http://ibm.com/support/
https://ibm.com/support/

To obtain the OpenSSL public key that can be used to verify the
signed advisories and ifixes:

Download the key from our web page:

http://www.ibm.com/systems/resources/systems_p_os_aix_security_pubkey.txt

Please contact your local IBM AIX support center for any
assistance.

REFERENCES:

Complete CVSS v3 Guide: http://www.first.org/cvss/user-guide
On-line Calculator v3:
http://www.first.org/cvss/calculator/3.0

RELATED INFORMATION:

IBM Secure Engineering Web Portal
http://www.ibm.com/security/secure-engineering/bulletins.html

IBM Product Security Incident Response Blog
https://www.ibm.com/blogs/psirt/

IBM PSIRT Blog – Potential Impact on Processors in the Power Family

Potential Impact on Processors in the POWER Family

Security Bulletin: IBM has released AIX and VIOS iFixes in response to the
vulnerabilities known as Spectre and Meltdown.
http://www-01.ibm.com/support/docview.wss?uid=isg3T1026912

ACKNOWLEDGEMENTS:

The vulnerability was reported to IBM by Google Project Zero.

CHANGE HISTORY:

First Issued: Thu Jan 25 08:15:51 CST 2018
| Updated: Fri Feb 9 14:32:35 CST 2018
| Update: Clarified reboot requirements for the AIX and VIOS
| iFixes, and provided a utility to verify proper iFix installation on
| AIX and VIOS. Refer to the FIXES section for these changes.
| Additional iFixes are now available. Additional iFixes are now available
| for:
| AIX 5300-12-09, 32-bit kernel version
| AIX 6100-09-08 and 6100-09-09
| AIX 7100-04-03 and 7100-04-04
| AIX 7200-00-03 and 7200-00-04
| AIX 7200-01-01 and 7200-01-02
| VIOS 2.2.4.30 and 2.2.4.40
| VIOS 2.2.5.10 and 2.2.5.20
| VIOS 2.2.6.0

===============================================================================

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact
of this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer
According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an “industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response.” IBM PROVIDES THE CVSS SCORES “AS IS” WITHOUT WARRANTY
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT
OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

LEAVE A REPLY

Please enter your comment!
Please enter your name here