Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2017.3199 RHEL patched in IBM products 14 December 2017 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: IBM Integration Bus Hypervisor Edition WebSphere Message Broker Hyperviser Edition Publisher: IBM Operating System: Virtualisation Red Hat Impact/Access: Provide Misleading Information -- Remote/Unauthenticated Access Confidential Data -- Remote/Unauthenticated Unauthorised Access -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2017-12163 CVE-2017-12151 CVE-2017-12150 Reference: ESB-2017.2802 Original Bulletin: http://www.ibm.com/support/docview.wss?uid=swg22011624 - --------------------------BEGIN INCLUDED TEXT-------------------- Action required for IBM Integration Bus Hypervisor Edition V9.0 and WebSphere Message Broker Hypervisor Edition V8.0 for security vulnerabilities in Red Hat Linux Document information Software version: 9.0 Operating system(s): Linux Reference #: 2011624 Modified date: 13 December 2017 Red Hat Enterprise Linux (RHEL) Server 6.2 -- RHEL Server 6 IIB WMB Abstract IBM Integration Bus Hypervisor Edition V9.0 and WebSphere Message Broker Hypervisor Edition V8.0 require customer action for security vulnerabilities in Red Hat Linux Content IBM Integration Bus Hypervisor Edition V9.0 and WebSphere Message Broker Hypervisor Edition V8.0 ship with versions of Red Hat Enterprise Linux (RHEL) Server that are vulnerable to CVE-ID: CVE-2017-12150 CVE-ID: CVE-2017-12151 CVE-ID: CVE-2017-12163 IBM Integration Bus Hypervisor Edition V9.0 and WebSphere Message Broker Hypervisor Edition V8.0 ship with Red Hat Enterprise Linux (RHEL) Server 6.2 Remediation: IBM strongly recommends that you contact Red Hat to obtain and install fixes for Red Hat Enterprise Linux (RHEL) Server 6.2, as applicable. - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBWjIYv4x+lLeg9Ub1AQhvKg/9FS/YHtn0cAKxobN3HBLH/HposU8J8bbo P9txd7epLhyS71HMu6VChrBE/t09U/Om1Zeqlu+GDMUmkQS+rgc/d3pBaxc1XzCe FNwz4rNqKPAimENUrg8DpTb1iVo4/GikG4orlsyXI2PMieSFyDBnr5+Y0buLwCPV qXxAhtcoYwGBfSW2jTC30SdwBTvGJUxqc688LdCq7oOklVnUi8/LXbBQlDffZj3+ vyHWagah7GYRfBOj2GtLI4pXgbFOXhuqv8GuDS8I2a0Rde1mfSudjkwdE0N+Xwii V3k/2xvJBUpFhgSfqm6DTL+VN9QJhBgRUcBjGGO83pl6b2NdTDRjTXnt60cuIWHd 9NuZPWOqFazYukt+FoaLzaVSol7qUkgwPN4OuMK2gkprv0aLIS5qSc1+f5QzaK2w o9F54QWYKhHHFZkwfUmUzdineqAyw/fRrt70xgmFSAwfckZHMCdXR1TqkBDzFozt TeD0VkYw6gE7UtGweIlRxA3UbFm5Uehx2Wy6yywN5vsHWT/zuO2r3tLx1LUozMmB qW+1unz6b2tch+VTlxHARcWUvLgXrS+qTqoVbvwE0nBIN1ykZ0jyGEYX5nhMOI7W /HiT6fsfxtCPELkqOeQ25/Kv9KFVYLb5+zX7x7DptVGj+hIiVt6iSAIwUgjGEVFX EoGGu0EFaGI= =B7UW -----END PGP SIGNATURE-----