-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2018.0084
    Action required for IBM Integration Bus Hypervisor Edition V9.0 and
           WebSphere Message Broker Hypervisor Edition V8.0 for
                 security vulnerabilities in Red Hat Linux
                              8 January 2018

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM Integration Bus Hypervisor Edition
Publisher:         IBM
Operating System:  Linux variants
Impact/Access:     Denial of Service        -- Remote/Unauthenticated      
                   Access Confidential Data -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2017-16546 CVE-2017-15281 CVE-2017-15277
                   CVE-2017-15033 CVE-2017-15032 CVE-2017-15017
                   CVE-2017-15016 CVE-2017-15015 CVE-2017-14989
                   CVE-2017-14741 CVE-2017-14739 

Original Bulletin: 
   http://www.ibm.com/support/docview.wss?uid=swg22011748
   http://www.ibm.com/support/docview.wss?uid=swg22011754
   http://www.ibm.com/support/docview.wss?uid=swg22011745

Comment: This bulletin contains three (3) IBM security advisories.

- --------------------------BEGIN INCLUDED TEXT--------------------

Action required for IBM Integration Bus Hypervisor Edition V9.0 and WebSphere
Message Broker Hypervisor Edition V8.0 for security vulnerabilities in Red Hat
Linux

Document information

More support for: IBM Integration Bus Hypervisor Edition

Software version: 9.0

Operating system(s): Linux

Reference #: 2011748

Modified date: 05 January 2018

IIB WMB

Flash (Alert)

Abstract

IBM Integration Bus Hypervisor Edition V9.0 and WebSphere Message Broker
Hypervisor Edition V8.0 require customer action for security vulnerabilities in
Red Hat Linux

Content

IBM Integration Bus Hypervisor Edition V9.0 and WebSphere Message Broker
Hypervisor Edition V8.0 ship with version Red Hat Enterprise Linux (RHEL)
Server 6.2 which is vulnerable to
CVE-2017-14739 CVE-2017-14741 CVE-2017-14989 CVE-2017-15015 CVE-2017-15016
CVE-2017-15017 CVE-2017-15032 CVE-2017-15033

Remediation:

IBM strongly recommends that you contact Red Hat to obtain and install fixes
for Red Hat Enterprise Linux (RHEL) Server 6.2, as applicable.

                          Cross reference information
   Segment                Product            Component Platform Version Edition
   Business    WebSphere Message Broker                Linux    8.0
 Integration   Hypervisor Edition

- -------------------------------------------------------------------------------

Action required for IBM Integration Bus Hypervisor Edition V9.0 and WebSphere
Message Broker Hypervisor Edition V8.0 for security vulnerabilities in Red Hat
Linux

Document information

More support for: IBM Integration Bus Hypervisor Edition

Software version: 9.0

Operating system(s): Linux

Reference #: 2011754

Modified date: 05 January 2018

IIB WMB

Flash (Alert)


Abstract

IBM Integration Bus Hypervisor Edition V9.0 and WebSphere Message Broker
Hypervisor Edition V8.0 require customer action for security vulnerabilities in
Red Hat Linux

Content

IBM Integration Bus Hypervisor Edition V9.0 and WebSphere Message Broker
Hypervisor Edition V8.0 ship with Red Hat Enterprise Linux (RHEL) Server 6.2
which is vulnerable to
CVE-2017-16546

Remediation:

IBM strongly recommends that you contact Red Hat to obtain and install fixes
for Red Hat Enterprise Linux (RHEL) Server 6.2, as applicable.


                          Cross reference information
   Segment                Product            Component Platform Version Edition
   Business    WebSphere Message Broker                Linux    8.0
 Integration   Hypervisor Edition

- -------------------------------------------------------------------------------

Action required for IBM Integration Bus Hypervisor Edition V9.0 and WebSphere
Message Broker Hypervisor Edition V8.0 for security vulnerabilities in Red Hat
Linux

Document information

More support for: IBM Integration Bus Hypervisor Edition

Software version: 9.0

Operating system(s): Linux

Reference #: 2011745

Modified date: 05 January 2018

IIB WMB

Flash (Alert)

Abstract

IBM Integration Bus Hypervisor Edition V9.0 and WebSphere Message Broker
Hypervisor Edition V8.0 require customer action for security vulnerabilities in
Red Hat Linux

Content

IBM Integration Bus Hypervisor Edition V9.0 and WebSphere Message Broker
Hypervisor Edition V8.0 ship with Red Hat Enterprise Linux (RHEL) Server 6.2
which is vulnerable to
CVE-2017-15277 CVE-2017-15281

Remediation:

IBM strongly recommends that you contact Red Hat to obtain and install fixes
for Red Hat Enterprise Linux (RHEL) Server 6.2, as applicable.


                          Cross reference information
   Segment                Product            Component Platform Version Edition
   Business    WebSphere Message Broker                Linux    8.0
 Integration   Hypervisor Edition

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBWlL8KIx+lLeg9Ub1AQjqeQ/9EVANnsSWsnvwZf7sbmKwgj6W/XQ6+lGM
4gGaf/tVhb5tkdJlffyhta8n7J7UV/43nAK48V/mxe0FaTbOt1rbFDYAgbM5q5CA
AfKLOLxosNs+N9wVl6gN+SdoJ+1Kd38cMF2IIt6r0x4w9NznGtsjwxXm9bWXEkCg
hBwZsNPYBgfdrjepzgGQAyKhcTWdN9WwYx+FIZ1GJPsatRV8o8ZN1uQXybAz/2oC
ZOQY3z1D+A09Z2sg63almpOdq0XaSV2eYNHWqoMFGFKLpulzQlASXi04FYwj9f+P
RN0Afqu00UatBymrvIIDLxHiHpk/YBnE8Wx5SRR/c1HDR902btlnI5dr4bJ6WlyV
kdWSSryAahOhAdemmmhmw1TOQ4L/nsyFhFPZLmiqh+rd4DAsstWquxjz4svD+0eN
x3ReugeN1tifbmLxsXt4uDovJTJWrM1d2WD7plI30XQw8nJrvHMagyt+AFtv9Jeb
CWwBN6gxZULCjgDn2wvFZZCcZuptjd1ZOs0zRrIjLIWIZEUarMMDHEBsWGkD9GpK
1iFyoACnIB5e0bZtWPDfXtnHnl9NdoIOcgxorokEKBMqQfV/m+oyk4po9piDoXU1
slC6rAu/kepQ83PaSSMyrjPtTJS68t0Eek5vnUjEjle/puE6uMlW55IqaY8X+9x1
wNhTcsMzG6I=
=Jtve
-----END PGP SIGNATURE-----