CVE-2025-0986

4.5 MEDIUM

📋 TL;DR

This vulnerability in IBM PowerVM Hypervisor firmware allows a local user with specific Linux processor compatibility mode configurations to cause undetected data corruption during gzip compression using hardware acceleration. Affected systems are IBM PowerVM Hypervisor running firmware versions FW1050.00-FW1050.30 and FW1060.00-FW1060.20.

💻 Affected Systems

Products:
  • IBM PowerVM Hypervisor
Versions: FW1050.00 through FW1050.30 and FW1060.00 through FW1060.20
Operating Systems: Linux with specific processor compatibility mode configurations
Default Config Vulnerable: ✅ No
Notes: Only vulnerable with specific Linux processor compatibility mode configurations using hardware acceleration for gzip compression.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Silent data corruption during gzip compression operations leading to data loss, file corruption, or system instability without detection.

🟠

Likely Case

Data integrity issues in compressed files or archives when using hardware acceleration, potentially affecting backup operations or data transfers.

🟢

If Mitigated

Minimal impact if hardware acceleration is disabled or affected configurations are avoided.

🌐 Internet-Facing: LOW - Requires local access and specific configuration.
🏢 Internal Only: MEDIUM - Local users with specific configurations could cause data corruption.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and specific configuration conditions to trigger the vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: FW1050.31 and FW1060.21 or later

Vendor Advisory: https://www.ibm.com/support/pages/node/7229349

Restart Required: Yes

Instructions:

1. Download firmware update from IBM Fix Central. 2. Apply firmware update to PowerVM Hypervisor. 3. Reboot the system to activate the new firmware.

🔧 Temporary Workarounds

Disable hardware acceleration for gzip

linux

Configure Linux to use software-based gzip compression instead of hardware acceleration.

echo 'options gzip_compress use_hw_accel=0' > /etc/modprobe.d/gzip.conf
reboot

Avoid affected processor compatibility modes

linux

Configure Linux to use processor compatibility modes not affected by this vulnerability.

Check current processor mode with 'ppc64_cpu --compat'
Consult IBM documentation for safe configurations

🧯 If You Can't Patch

  • Disable hardware acceleration for gzip compression operations.
  • Implement data integrity checks on compressed files and archives.

🔍 How to Verify

Check if Vulnerable:

Check firmware version with 'lparstat -i' or 'lssyscfg -r sys -F state,type_model,serial_num,refcode' and compare to affected versions.

Check Version:

lparstat -i | grep Firmware

Verify Fix Applied:

Verify firmware version is FW1050.31/FW1060.21 or later using same commands.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected gzip compression errors
  • Data integrity check failures on compressed files
  • Hardware acceleration errors in system logs

Network Indicators:

  • None - local vulnerability only

SIEM Query:

source="system_logs" AND ("gzip" OR "compression") AND ("error" OR "corruption" OR "integrity")

🔗 References

📤 Share & Export