Medium Severity

Security Bulletin: A vulnerability in Apache Log4j affects some features of IBM® Db2® (CVE-2021-44832)

Share this post:

The Apache Log4j open source library used by IBM® Db2® is affected by a vulnerability that could allow a remote attacker to execute arbitrary code on the system. This library is used by the Db2 Federation feature. The fix for the vulnerability is to update the log4j library to version 2.17.1. Please see CVE-2021-4104 for bulletin relating to Log4j V1. Please see CVE-2021-45046, CVE-2021-45105 and CVE-2021-44228 for bulletins relating to Log4j V2.

CVE(s): CVE-2021-44832

Affected product(s) and affected version(s):

Fix pack levels of IBM Db2 V11.5 for all editions on all platforms are affected only if the following features are configured:

Federation:  

  •   DVM JDBC wrapper driver,
  •   NoSQL wrapper driver (for Hadoop),
  •   Blockchain wrapper driver (for Hyperledger Fabric, Linux 64-bit, x86-64 only)

 

IBM Db2 V9.7, V10.1, V10.5 and V11.1 are not affected by this issue.  Please note that log4j v1.x was removed in a previous build, and customers are strongly recommended to apply those fixes if you are on an older version of Db2.  See Security Bulletin for details.

 

To determine if Federation is enabled, issue the following:

       db2 get dbm cfg | grep FEDERATED

If a value of NO is returned, you are not vulnerable.

 

You can determine if you are using one of the affected wrappers by performing:

To determine if the DVM JDBC wrapper is in use, issue the following statement:

        db2 "select servername from syscat.serveroptions where option = 'DRIVER_CLASS' and setting = 'com.rs.jdbc.dv.DvDriver'"

        If a servername is returned, then you are using the DVM JDBC wrapper via the DvDriver class.

To determine if the NoSQL hadoop wrapper is in use, issue the following statement:

       db2 "select * from syscat.servers where servertype = 'HDFSPARQUET'" 

       If 1 or more rows are returned, then NoSQL hadoop wrapper is in use.

 

To determine if the NoSQL Blockchain wrapper is in use, issue the following statement:

       db2 "select * from syscat.serveroptions where option='PEER_URL'"

       If 1 or more rows are returned, then NoSQL Blockchain wrapper is in use.

 

Refer to the following reference URLs for remediation and additional vulnerability details:  
Source Bulletin: https://www.ibm.com/support/pages/node/6549888
X-Force Database: https://exchange.xforce.ibmcloud.com/vulnerabilities/216189

More stories

Security Bulletin: A Security Vulnerability was fixed in IBM Application Gateway.

September 27, 2022 | Medium Severity

IBM Security Application Gateway is vulnerable to cross-site scripting. This has been fixed in IBM Application Gateway 22.07 ...read more


Security Bulletin: IBM WebSphere Application Server is vulnerable to Server-Side Request Forgery (CVE-2022-35282)

September 27, 2022 | Medium Severity

IBM WebSphere Application Server is vulnerable to a server-side request forgery vulnerability. This has been addressed. ...read more


Security Bulletin: Information disclosure vulnerability in IBM QRadar User Behavior Analytics (CVE-2022-36771)

September 27, 2022 | Medium Severity

Non-Admin access to some admin level information was available if users had correct paths to the information. Checks were added to authorize access even when it is not initiated from the user interface. ...read more