Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2018.2911.2 Multiple vulnerabilities have been identified in IBM Netezza Host Management 11 December 2018 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: IBM Netezza Host Management Publisher: IBM Operating System: Network Appliance Impact/Access: Execute Arbitrary Code/Commands -- Remote/Unauthenticated Increased Privileges -- Existing Account Create Arbitrary Files -- Remote with User Interaction Denial of Service -- Remote/Unauthenticated Access Confidential Data -- Remote/Unauthenticated Unauthorised Access -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2018-1000805 CVE-2018-1000156 CVE-2018-12539 CVE-2018-7750 CVE-2018-5740 CVE-2018-5146 CVE-2018-2973 CVE-2018-2952 CVE-2018-2940 CVE-2018-1656 CVE-2018-1517 CVE-2018-1050 CVE-2017-15804 CVE-2017-15670 CVE-2016-0705 Reference: ASB-2018.0197 ASB-2018.0169 ASB-2018.0124 ASB-2018.0060 ESB-2016.0560 ESB-2016.0547 ESB-2016.0544 ESB-2016.0543.2 Original Bulletin: http://www.ibm.com/support/docview.wss?uid=ibm10729465 http://www.ibm.com/support/docview.wss?uid=ibm10729297 http://www.ibm.com/support/docview.wss?uid=ibm10729637 http://www.ibm.com/support/docview.wss?uid=ibm10729303 http://www.ibm.com/support/docview.wss?uid=ibm10732846 http://www.ibm.com/support/docview.wss?uid=ibm10787453 Comment: This bulletin contains six (6) IBM security advisories. Revision History: December 11 2018: Added #0787453 September 27 2018: Initial Release - --------------------------BEGIN INCLUDED TEXT-------------------- Security Bulletin: Open Source GNU glibc Vulnerabilities affect IBM Netezza Host Management Security Bulletin Document information More support for: PureData System for Analytics Software version: All Versions Operating system(s): Platform Independent Reference #: 0729465 Modified date: 26 September 2018 Summary Open Source GNU glibc is used by IBM Netezza Host Management. IBM Netezza Host Management has addressed the applicable CVEs. Vulnerability Details CVEID: CVE-2017-15804 DESCRIPTION: GNU C Library (aka glibc or libc6) is vulnerable to a buffer overflow, caused by improper bounds checking by glob function in glob.c. By using a specially-crafted file, a local attacker could overflow a buffer. CVSS Base Score: 5.3 CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/ 133996 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L) CVEID: CVE-2017-15670 DESCRIPTION: GNU C Library is vulnerable to a heap-based buffer overflow, caused by improper bounds checking by the glob function in glob.c. By sending a specially-crafted string, a remote attacker could overflow a buffer and execute arbitrary code on the system. CVSS Base Score: 7.3 CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/ 133915 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L) Affected Products and Versions o IBM Netezza Host Management 5.3.2-5.4.20 Remediation/Fixes To resolve the reported CVEs for Red Hat Enterprise Linux (RHEL) on following platforms : PureData System for Analytics N3001 PureData System for Analytics N200x Update to the following IBM Netezza Host Management release : +----------------------------+------+-----------------------+ | Product | VRMF |Remediation / First Fix| +----------------------------+------+-----------------------+ |IBM Netezza Host Management |5.4.21|Link to Fix Central | +----------------------------+------+-----------------------+ The Netezza Host Management software contains the latest RHEL updates for the operating systems certified for use on IBM Netezza/PureData System for Analytics appliances. IBM recommends upgrading to the latest Netezza Host Management version to ensure that your hosts have the latest fixes, security changes, and operating system updates. IBM Support can assist you with planning for the Netezza Host Management and operating system upgrades to your appliances. For more details on IBM Netezza Host Management security patching: o Red Hat Enterprise Linux (RHEL) Security Patching for IBM PureData System for Analytics appliances Change History 26 September 2018: Original version published *The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin. Disclaimer According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY. - -------------------------------------------------------------------------------- Security Bulletin: Open Source Libvorbis, Patch and Python-paramiko vulnerabilities affect IBM Netezza Host Management Security Bulletin Document information More support for: PureData System for Analytics Software version: All Versions Operating system(s): Platform Independent Reference #: 0729297 Modified date: 26 September 2018 Summary Open Source Libvorbis Patch and Python-paramiko is used by IBM Netezza Host Mangement. IBM Netezza Host Management has addressed the applicable CVEs. Vulnerability Details CVEID: CVE-2018-7750 DESCRIPTION: Paramiko could allow a remote attacker to bypass security restrictions, caused by improper authentication in the transport.py in the SSH server implementation. An attacker could exploit this vulnerability to bypass the authentication process. CVSS Base Score: 5.3 CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/ 140334 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N) CVEID: CVE-2018-1000156 DESCRIPTION: GNU Patch could allow a remote attacker to execute arbitrary code on the system, caused by an input validation error when processing patch files. An attacker could exploit this vulnerability using a patch file processed via the patch utility to execute arbitrary code on the system. CVSS Base Score: 7.3 CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/ 141283 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L) CVEID: CVE-2018-5146 DESCRIPTION: libvorbis, as used in Mozilla Firefox, could allow a remote attacker to execute arbitrary code on the system, caused by an out-of-bounds memory write. By persuading a victim to open a specially-crafted media file, an attacker could exploit this vulnerability to execute arbitrary code on the system or cause the browser to crash. CVSS Base Score: 8.8 CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/ 140404 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) Affected Products and Versions o IBM Netezza Host Management 5.4.5.0 - 5.4.20.0 Remediation/Fixes To resolve the reported CVEs for Red Hat Enterprise Linux (RHEL) on following platforms : PureData System for Analytics N3001 PureData System for Analytics N200x Update to the following IBM Netezza Host Management release : +----------------------------+--------+-----------------------+ | Product | VRMF |Remediation / First Fix| +----------------------------+--------+-----------------------+ |IBM Netezza Host Management |5.4.21.0|Link to Fix Central | +----------------------------+--------+-----------------------+ The Netezza Host Management software contains the latest RHEL updates for the operating systems certified for use on IBM Netezza/PureData System for Analytics appliances. IBM recommends upgrading to the latest Netezza Host Management version to ensure that your hosts have the latest fixes, security changes, and operating system updates. IBM Support can assist you with planning for the Netezza Host Management and operating system upgrades to your appliances. For more details on IBM Netezza Host Management security patching: o Red Hat Enterprise Linux (RHEL) Security Patching for IBM PureData System for Analytics appliances Change History 26 September 2018: Original version published *The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin. Disclaimer According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY. - -------------------------------------------------------------------------------- Security Bulletin: Publicly disclosed vulnerability from BIND affect IBM Netezza Host Management Security Bulletin Document information More support for: PureData System for Analytics Software version: All Versions Operating system(s): Platform Independent Reference #: 0729637 Modified date: 26 September 2018 Summary Open Source Bind is used by IBM Netezza Host Management. IBM Netezza Host Management has addressed the applicable CVE. Vulnerability Details CVEID: CVE-2018-5740 DESCRIPTION: ISC BIND is vulnerable to a denial of service, caused by a defect in the deny-answer-aliases feature. By triggering this defect, a remote attacker could exploit this vulnerability to cause an INSIST assertion failure in name.c. CVSS Base Score: 7.5 CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/ 148131 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) Affected Products and Versions o IBM Netezza Host Management 5.3.8 - 5.4.20 Remediation/Fixes To resolve the reported CVE for Red Hat Enterprise Linux (RHEL) on following platforms : PureData System for Analytics N3001 PureData System for Analytics N200x Update to the following IBM Netezza Host Management release : +----------------------------+------+-----------------------+ | Product | VRMF |Remediation / First Fix| +----------------------------+------+-----------------------+ |IBM Netezza Host Management |5.4.21|Link to Fix Central | +----------------------------+------+-----------------------+ The Netezza Host Management software contains the latest RHEL updates for the operating systems certified for use on IBM Netezza/PureData System for Analytics appliances. IBM recommends upgrading to the latest Netezza Host Management version to ensure that your hosts have the latest fixes, security changes, and operating system updates. IBM Support can assist you with planning for the Netezza Host Management and operating system upgrades to your appliances. For more details on IBM Netezza Host Management security patching: o Red Hat Enterprise Linux (RHEL) Security Patching for IBM PureData System for Analytics appliances Change History 26 September 2018: Original version published *The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin. Disclaimer According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY. - -------------------------------------------------------------------------------- Security Bulletin: Public disclosed vulnerability from Samba affect IBM Netezza Host Management Security Bulletin Document information More support for: PureData System for Analytics Software version: All Versions Operating system(s): Platform Independent Reference #: 0729303 Modified date: 26 September 2018 Summary Open Source Samba is used by IBM Netezza Host Management. IBM Netezza Host Management has addressed the applicable CVE. Vulnerability Details CVEID: CVE-2018-1050 DESCRIPTION: Samba is vulnerable to a denial of service, caused by missing null pointer checks on some of the input parameters. By sending specially RPC calls to the 'spoolss' service, a remote attacker could exploit this vulnerability to cause the print spooler service to crash. CVSS Base Score: 7.5 CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/ 140206 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) Affected Products and Versions o IBM Netezza Host Management 5.4.5.0 - 5.4.20.0 Remediation/Fixes To resolve the reported CVE for Red Hat Enterprise Linux (RHEL) on following platforms : PureData System for Analytics N3001 PureData System for Analytics N200x Update to the following IBM Netezza Host Management release : +----------------------------+--------+-----------------------+ | Product | VRMF |Remediation / First Fix| +----------------------------+--------+-----------------------+ |IBM Netezza Host Management |5.4.21.0|Link to Fix Central | +----------------------------+--------+-----------------------+ The Netezza Host Management software contains the latest RHEL updates for the operating systems certified for use on IBM Netezza/PureData System for Analytics appliances. IBM recommends upgrading to the latest Netezza Host Management version to ensure that your hosts have the latest fixes, security changes, and operating system updates. IBM Support can assist you with planning for the Netezza Host Management and operating system upgrades to your appliances. For more details on IBM Netezza Host Management security patching: o Red Hat Enterprise Linux (RHEL) Security Patching for IBM PureData System for Analytics appliances Change History 26 September 2018: Original version published *The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin. Disclaimer According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY. - -------------------------------------------------------------------------------- Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect IBM Platform Symphony and IBM Spectrum Symphony Security Bulletin Document information More support for: IBM Spectrum Symphony Software version: 7.1.1, 7.1.2, 7.2.0.2, 7.1 Fix Pack 1 Operating system(s): Linux Reference #: 0732846 Modified date: 26 September 2018 Summary There are multiple vulnerabilities in IBM(R) Runtime Environment Java(TM) Version 8 Service Refresh 5 Fix Pack 15 and earlier releases used by IBM Platform Symphony and IBM Spectrum Symphony. IBM Platform Symphony and IBM Spectrum Symphony have addressed the applicable CVEs. Vulnerability Details If you run your own Java code using the IBM Java Runtime delivered with this product, you should evaluate your code to determine whether additional Java vulnerabilities are applicable to your code. For a complete list of vulnerabilities, refer to the "IBM Java SDK Security Bulletin", located in the References section for more information. CVEID: CVE-2018-2973 DESCRIPTION: An unspecified vulnerability related to the Java SE JSSE component could allow an unauthenticated attacker to cause no confidentiality impact, high integrity impact, and no availability impact. CVSS Base Score: 5.9 CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/ 146835 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N) CVEID: CVE-2018-2940 DESCRIPTION: An unspecified vulnerability related to the Java SE Libraries component could allow an unauthenticated attacker to obtain sensitive information resulting in a low confidentiality impact using unknown attack vectors. CVSS Base Score: 4.3 CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/ 146803 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N) CVEID: CVE-2018-2952 DESCRIPTION: An unspecified vulnerability related to the Java SE Concurrency component could allow an unauthenticated attacker to cause a denial of service resulting in a low availability impact using unknown attack vectors. CVSS Base Score: 3.7 CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/ 146815 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L) CVEID: CVE-2018-1656 DESCRIPTION: The IBM Java Runtime Environment's Diagnostic Tooling Framework for Java (DTFJ) does not protect against path traversal attacks when extracting compressed dump files. CVSS Base Score: 7.4 CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/ 144882 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N) CVEID: CVE-2018-12539 DESCRIPTION: Eclipse OpenJ9 could allow a local attacker to gain elevated privileges on the system, caused by the failure to restrict the use of Java Attach API to connect to an Eclipse OpenJ9 or IBM JVM on the same machine and use Attach API operations to only the process owner. An attacker could exploit this vulnerability to execute untrusted native code and gain elevated privileges on the system. CVSS Base Score: 8.4 CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/ 148389 for more information CVSS Environmental Score*: Undefined CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) CVEID: CVE-2018-1517 DESCRIPTION: A flaw in the java.math component in IBM SDK, Java Technology Edition may allow an attacker to inflict a denial-of-service attack with specially crafted String data. CVSS Base Score: 5.9 CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/ 141681 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) CVEID: CVE-2016-0705 DESCRIPTION: OpenSSL is vulnerable to a denial of service, caused by a double-free error when parsing DSA private keys. An attacker could exploit this vulnerability to corrupt memory and cause a denial of service. CVSS Base Score: 3.7 CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/ 111140 for more information CVSS Environmental Score*: Undefined CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L) Affected Products and Versions IBM Platform Symphony 7.1 Fix Pack 1 IBM Platform Symphony 7.1.1 IBM Spectrum Symphony 7.1.2 IBM Spectrum Symphony 7.2.0.2 Remediation/Fixes Applicability o Operating systems: Linux x64 o Cluster type: Single grid cluster Prerequisite To install or uninstall the .rpm packages for IBM Spectrum Symphony 7.1.2 and 7.2.0.2, you must have root permission and RPM version 4.2.1 or later must be installed on the host. Before installation 1. Log on to the master host as the cluster administrator. 2. Disable your applications, stop services, and shut down the cluster: > source profile.platform > soamcontrol app disable all > egosh service stop all > egosh ego shutdown all 3. Back up or uninstall the existing JRE on all management hosts: For Platform Symphony 7.1 Fix Pack 1 and 7.1.1, back up the JRE folder (under $EGO_TOP/jre/<EGO_version>/linux-x86_64/). For example, in a Platform Symphony 7.1.1 cluster, back up the JRE folder at $EGO_TOP/jre/3.3/linux-x86_64/. For IBM Spectrum Symphony 7.1.2 and 7.2.0.2, uninstall the existing JRE. 1. Query the existing JRE package and uninstall it from the dbpath location, for example: > rpm -qa --dbpath /tmp/rpm |grep egojre egojre-1.8.0.3-408454.x86_64 > rpm -e egojre-1.8.0.3-408454.x86_64 --dbpath /tmp/rpm --nodeps 2. For IBM Spectrum Symphony 7.2.0.2, remove the leftover link under the jre folder, for example: > rm -rf $EGO_TOP/jre/8.0.5.0 Install this interim fix 1. Log on each management host as the cluster administrator and replace your current JRE folder with the files in this interim fix. For Platform Symphony 7.1 Fix Pack 1 and 7.1.1, remove the files in the existing JRE folder and extract the interim package to the JRE folder on all hosts. For example, in a Platform Symphony 7.1.1 cluster, enter the following commands: > rm -rf $EGO_TOP/jre/3.3/linux-x86_64/* > tar zxfo symSetup_jre8sr5fp21_linux-64_build502764.tar.gz -C $EGO_TOP/jre/3.3 /linux-x86_64 For IBM Spectrum Symphony 7.1.2 and 7.2.0.2, use the same dbpath and prefix as the installation, for example: > rpm -ivh --dbpath /tmp/rpm --prefix /opt/platform egojre-1.8.0.521.x86_64.rpm 2. Delete all subdirectories and files in the GUI work directory: > rm -rf $EGO_TOP/gui/work/* > rm -rf $EGO_TOP/gui/workarea/* NOTE: If you configured the WLP_OUTPUT_DIR parameter and APPEND_HOSTNAME_TO_WLP_OUTPUT_DIR is set to true in the $EGO_CONFDIR/conf/ wlp.conf file, you must clean up the $WLP_OUTPUT_DIR/webgui_hostname/gui/ workarea/ directory. 3. Launch your browser and clear the browser cache. 4. Log on to the master host as the cluster administrator, start the cluster and enable your applications: > source profile.platform > egosh ego start all > soamcontrol app enable <appName> Verify the installation o For Platform Symphony 7.1 Fix Pack 1, the following example shows output for the java -version command: > $EGO_TOP/jre/3.1/linux-x86_64/bin/java -version java version "1.8.0_181" Java(TM) SE Runtime Environment (build 8.0.5.21 - pxa6480sr5fp21-20180830_01 (SR5 FP21)) IBM J9 VM (build 2.9, JRE 1.8.0 Linux amd64-64-Bit Compressed References 20180829_395745 (JIT enabled, AOT enabled) OpenJ9 - e82188c OMR - eeaa30e IBM - 98805ca) JCL - 20180821_01 based on Oracle jdk8u181-b12 o For Platform Symphony 7.1.1, the following example shows output for the java -version command: > $EGO_TOP/jre/3.3/linux-x86_64/bin/java -version java version "1.8.0_181" Java(TM) SE Runtime Environment (build 8.0.5.21 - pxa6480sr5fp21-20180830_01 (SR5 FP21)) IBM J9 VM (build 2.9, JRE 1.8.0 Linux amd64-64-Bit Compressed References 20180829_395745 (JIT enabled, AOT enabled) OpenJ9 - e82188c OMR - eeaa30e IBM - 98805ca) JCL - 20180821_01 based on Oracle jdk8u181-b12 o For IBM Spectrum Symphony 7.1.2, the following example shows output for the rpm -qa command: > rpm -qa --dbpath /tmp/rpm |grep egojre egojre-1.8.0.521-502764.x86_64 o For IBM Spectrum Symphony 7.2.0.2, the following example shows output for the rpm -qa command: > rpm -qa --dbpath /tmp/rpm |grep egojre egojre-8.0.5.21-502764.x86_64 Uninstallation If required, follow these instructions to uninstall this interim fix in your cluster: 1. Log on to the master host as the cluster administrator. 2. Disable your applications, stop services, and shut down the cluster: > source profile.platform > soamcontrol app disable all > egosh service stop all > egosh ego shutdown all 3. Log on each management host as the cluster administrator and restore the JRE folder from your backup. For Platform Symphony 7.1 Fix Pack 1 and 7.1.1, restore your backup to the $EGO_TOP/jre/<EGO_version>/linux-x86_64/ folder. For example, in a Platform Symphony 7.1.1 cluster, restore your backup to the $EGO_TOP/jre/3.3/ linux-x86_64/ folder. For IBM Spectrum Symphony 7.1.2 and 7.2.0.2, uninstall the existing JRE, then install the old one: 1. Uninstall the JRE fix, for example: > rpm -e egojre-1.8.0.521-502764.x86_64 --dbpath /tmp/rpm/ --nodeps 2. For IBM Spectrum Symphony 7.2.0.2, remove the leftover link under the jre folder, for example: > rm -rf $EGO_TOP/jre/8.0.5.21 3. Extract the egojre .rpm package from the .bin installation package, for example, for IBM Spectrum Symphony 7.1.2: > sym-7.1.2.0_x86_64.bin --extract /opt/extract 4. Reinstall the old JRE package. Use the same dbpath and prefix as the installation, for example: > rpm -ivh --dbpath /tmp/rpm --prefix /opt/platform /opt/extract/egojre-1.8.0.3.x86_64.rpm 4. Delete all subdirectories and files in the GUI work directory: > rm -rf $EGO_TOP/gui/work/* > rm -rf $EGO_TOP/gui/workarea/* NOTE: If you configured the WLP_OUTPUT_DIR parameter and APPEND_HOSTNAME_TO_WLP_OUTPUT_DIR is set to true in the $EGO_CONFDIR/conf/ wlp.conf file, you must clean up the $WLP_OUTPUT_DIR/webgui_hostname/gui/ workarea/ directory. 5. Launch your browser and clear the browser cache. 6. Log on to the master host as the cluster administrator, start the cluster and enable your applications: > source profile.platform > egosh ego start all > soamcontrol app enable <appName> Packages +--------+-------+-------+----------------------------------------------------+ |Product |VRMF |APAR |Remediation/First Fix | +--------+-------+-------+----------------------------------------------------+ | | | |symSetup_jre8sr5fp21_linux-64_build502764.tar.gz | |IBM | | | | |Platform|7.1 Fix|P102730|http://www.ibm.com/support/fixcentral/swg/ | |Symphony|Pack 1 | |selectFixes?product=ibm/Other+software/ | | | | |Platform+Symphony&release=All&platform=All&function=| | | | |fixId&fixids=sym-7.1-build502764&includeSupersedes=0| +--------+-------+-------+----------------------------------------------------+ | | | |symSetup_jre8sr5fp21_linux-64_build502764.tar.gz | | | | | | |IBM | | |http://www.ibm.com/support/fixcentral/swg/ | |Platform|7.1.1 |P102730|selectFixes?product=ibm/Other+software/ | |Symphony| | |Platform+Symphony&release=All&platform=All&function=| | | | |fixId&fixids=sym-7.1.1-build502764&includeSupersedes| | | | |=0 | +--------+-------+-------+----------------------------------------------------+ | | | |egojre-1.8.0.521.x86_64.rpm | | | | | | |IBM | | |http://www.ibm.com/support/fixcentral/swg/ | |Spectrum|7.1.2 |P102730|selectFixes?product=ibm/Other+software/ | |Symphony| | |IBM+Spectrum+Symphony&release=All&platform=All& | | | | |function=fixId&fixids=sym-7.1.2-build502764& | | | | |includeSupersedes=0 | +--------+-------+-------+----------------------------------------------------+ | | | |egojre-8.0.5.21.x86_64.rpm | | | | | | |IBM | | |http://www.ibm.com/support/fixcentral/swg/ | |Spectrum|7.2.0.2|P102730|selectFixes?product=ibm/Other+software/ | |Symphony| | |IBM+Spectrum+Symphony&release=All&platform=All& | | | | |function=fixId&fixids=sym-7.2.0.2-build502764& | | | | |includeSupersedes=0 | +--------+-------+-------+----------------------------------------------------+ Workarounds and Mitigations None Get Notified about Future Security Bulletins Subscribe to My Notifications to be notified of important product support alerts like this. Reference Complete CVSS v3 Guide On-line Calculator v3 IBM Java SDK Security Bulletin Related Information IBM Secure Engineering Web Portal IBM Product Security Incident Response Blog Change History 25 September 2018: Original version published *The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin. Disclaimer According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY. Cross reference information Product Component Platform Version Edition Platform Symphony Linux 7.1 Fix Pack 1, 7.1.1 - -------------------------------------------------------------------------------- Security Bulletin: Open Source Python-paramiko vulnerability affects IBM Netezza Host Management. Document information Software version: All Versions Operating system(s): Platform Independent Reference #: 0787453 Modified date: 10 December 2018 Summary Open Source Python-paramiko is used by IBM Netezza Host Management. IBM Netezza Host Management has addressed the applicable CVE. Vulnerability Details CVEID: CVE-2018-1000805 DESCRIPTION: Paramiko could allow a remote attacker to execute arbitrary code on the system, caused by an incorrect access control flaw in SSH server. An attacker could exploit this vulnerability to execute arbitrary code on the system. CVSS Base Score: 9.8 CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/ 151370 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) Affected Products and Versions IBM Netezza Host Management 5.4.5.0 - 5.4.22.0 Remediation/Fixes To resolve the reported CVEs for Red Hat Enterprise Linux (RHEL) on following platforms : PureData System for Analytics N3001 PureData System for Analytics N200x Update to the following IBM Netezza Host Management release : +-------------------------------------------------------------+ | Product | VRMF |Remediation / First Fix| |----------------------------+--------+-----------------------| |IBM Netezza Host Management |5.4.23.0|Link to Fix Central | +-------------------------------------------------------------+ The Netezza Host Management software contains the latest RHEL updates for the operating systems certified for use on IBM Netezza/PureData System for Analytics appliances. IBM recommends upgrading to the latest Netezza Host Management version to ensure that your hosts have the latest fixes, security changes, and operating system updates. IBM Support can assist you with planning for the Netezza Host Management and operating system upgrades to your appliances. For more details on IBM Netezza Host Management security patching: * Red Hat Enterprise Linux (RHEL) Security Patching for IBM PureData System for Analytics appliances Change History 10 December 2018: Original version published - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXA9INmaOgq3Tt24GAQgYfxAAk1coo/5HqVzNLhGF1EUY1TveLiY8hkHO ZGygn+2zYYQTecCorRkD4UI0BoO/SF8w+E6fhv5DVIVauQJtJ8F53y6PRynkzaof vcSCKgKi/PA+2bpUs7RuEOwEkG90PSSI1SWJsxXNGJSVCJtMF1+gCC14bQqel2Cc ZA9VcPW8IK02K27wO9ZI2yco93WnSIaeNfHRvNDltLmGPwu/GgN9eOC0G0ceKLP1 uODq5NgeEmG7uyoaj6uCI93r9Bs+qcw6SMIGbjzCjwEacp7aJerd8iGJqNnPDX46 WpIhPYHZflaCktbsac3+Zf1k47EA5LpqOVM4HXvG5MoRW91Snny/8Yg2Pe+G7gSC ZzT7a/cdSAv/ck1VPLhxecIWdAOJOQA3ighdcZLdXX7wbbUbwEqhH6jGqV7Ta0nC SUKRTLzI7l3IY/i62sYH2X/s8x3IWm4EiuxUSdaeO+RX2PDbGVXlnRzBI3b10+Uk L/S7UyRA8i6d9rePB76RItliCkkl1DfjGYLPtbtVshrkweO8Si31xxoWIJU1TNi0 PycxLbtp5qgfInk84m9SpfEy+l7H4+L+PxzHQK+hOJoky2je7RQ2ZafdZ0dLzMMt HOaKyr0+xeR7vV+Laf/5Y2OYFtOVorbf3HgRXhx4Sjt6d3aY7pEOt/h+2bjP+9oI LaRoujxSDxw= =ePAS -----END PGP SIGNATURE-----