IBM i PTF Guide, Volume 20, Number 11
March 21, 2018 Doug Bidwell
New cumes!! V7R3 and V7R2 both have new cumulative PTF groups this week. This effectively correlates the roll-up of the Spectre and Meltdown patches into a traditional apply methodology. Check our PTF Guide for the latest activity on both Spectre and Meltdown and your applicable release. In a nutshell, loading the latest cume and groups gets you protected at the LIC and OS levels. For firmware, you still need to determine and address separately.
Also, read the cover letter for the cume carefully — if you are running PowerHa or Content Manager, there are “things” you need to be aware of before putting on this cume!
Spectre/Meltdown (SM) Update – IBM has finally merged the Spectre/Meltdown PTFs into the normal “Group” methodology we work with every week. So, to get current on Spectre and Meltdown for your appropriate release apply the below levels (or higher):
|7.1 Groups||7.2 Groups||7.3 Groups|
ISC reports BIND is vulnerable to a denial of service, caused by a use-after-free when improperly sequencing cleanup operations on upstream recursion fetch contexts. A remote attacker could exploit this vulnerability to make named crash with an assertion failure.
The IBM i fixing PTF numbers are:
Release 7.3 – SI66812
Release 7.2 – SI66813
Release 7.1 – SI66814
Release 6.1 – SI66815