IBM Support

Mitigating CVE-2017-5715, CVE-2017-5753 and CVE-2017-5754 in PureApplication System W1700, W2700, and W3700

Troubleshooting


Problem

PureApplication System W1700, W2700, and W3700 systems are affected by the hardware processor vulnerabilities CVE-2017-5715, CVE-2017-5753, and CVE-2017-5754 that are named Spectre and Meltdown.

Resolving The Problem

Fully addressing these vulnerabilities in PureApplication System requires applicable firmware updates from hardware device manufacturers for management and compute nodes, hypervisor software updates, and operating system (OS) updates for virtual images and deployed virtual machines.

IBM has released fixes for firmware, AIX and VIOS in response to CVE-2017-5715, CVE-2017-5753, and CVE-2017-5754. Both the AIX/VIOS and firmware fixes are required to address the vulnerabilities.

The firmware fix is applied to compute nodes as part of the upgrade to version 2.2.5.0. The AIX 7.1 and 7.2 base OS virtual images that are delivered as part of PureApplication System 2.2.5.0 have been patched with fixes.


    These patches include:
    • FSP updates
      • POWER8:   FW860.42 (01SV860_138_056)
      • POWER7:  FW783.51  (01AF783_039_021)
    • VIOS updates 
      • VIOS 2.2.5.30 + efix IJ03030m9b
    • Kernel patches in base OS images

New deployments using these updated virtual images will be protected from the vulnerabilities:
  • IBM OS Image for AIX Systems (AIX 7.1) 2.1.10.0
  • IBM OS Image for AIX Systems (AIX 7.2) 3.0.0.0

You must patch existing virtual images and workloads with the available updates.

Refer to "Security Bulletin: IBM has released AIX and VIOS iFixes in response to the vulnerabilities known as Spectre and Meltdown" to determine whether the affected filesets are installed on your virtual machines and how to update them.


To patch existing workloads that run on the AIX OS, you can either use an emergency fix that is installed through PureApplication System or the IBM Endpoint Manager Service. For more information, see the following Knowledge Center documents:

IBM Endpoint Manager Service:

Emergency fix:

Important: After applying patches to existing VMs, you must restart the VMs for the patches to be effective.


Use these steps to extend an affected virtual image, apply the patches, and capture the updated virtual image for use with your to-be-deployed workloads (also referred to as deployments or instances):
  1. Extend a virtual image, which deploys a classic virtual system virtual machine image:
    1. Click Catalog > Virtual Images.
    2. Select a virtual image, and then click Extend.
    3. Enter values in the General information and Deployment configuration sections.
    4. Click OK.
    5. A new entry is created in the virtual images list. Click the new image.
    6. Click the link for In the cloud now.
    7. You are redirected to the Virtual System Instances (Classic) page. The status of this instance should be Running.
  2. Log on to the classic virtual system virtual machine, and apply the operating system patch to the virtual machine (VM). Refer to "Security Bulletin: IBM has released AIX and VIOS iFixes in response to the vulnerabilities known as Spectre and Meltdown" for more information.
  3. Capture a new virtual image from the classic virtual system VM:
    1. Click Catalog > Virtual images.
    2. Select your extended image and click Capture.
  4. Use Pattern Builder to update patterns to use the new virtual image.

For W1500, W2500, W3500, and W3550 systems, see: Mitigating CVE-2017-5715, CVE-2017-5753 and CVE-2017-5754 in PureApplication System W1500, W2500, W3500, and W3550.

[{"Product":{"code":"SSM8NY","label":"PureApplication System"},"Business Unit":{"code":"BU053","label":"Cloud & Data Platform"},"Component":"--","Platform":[{"code":"PF016","label":"Linux"}],"Version":"2.2.5.0","Edition":"","Line of Business":{"code":"","label":""}}]

Document Information

Modified date:
15 June 2018

UID

swg22014828