June 7, 2022
Categorized: Medium Severity
Share this post:
The Apache Log4j open source library used by IBM® Db2® is affected by a vulnerability that could allow a remote attacker to execute arbitrary code on the system. This library is used by the Db2 Federation feature. The fix for the vulnerability is to update the log4j library to version 2.17.1. Please see CVE-2021-4104 for bulletin relating to Log4j V1. Please see CVE-2021-45046, CVE-2021-45105 and CVE-2021-44228 for bulletins relating to Log4j V2.
Affected product(s) and affected version(s):
Fix pack levels of IBM Db2 V11.5 for all editions on all platforms are affected only if the following features are configured:
- DVM JDBC wrapper driver,
- NoSQL wrapper driver (for Hadoop),
- Blockchain wrapper driver (for Hyperledger Fabric, Linux 64-bit, x86-64 only)
IBM Db2 V9.7, V10.1, V10.5 and V11.1 are not affected by this issue. Please note that log4j v1.x was removed in a previous build, and customers are strongly recommended to apply those fixes if you are on an older version of Db2. See Security Bulletin for details.
To determine if Federation is enabled, issue the following:
db2 get dbm cfg | grep FEDERATED
If a value of NO is returned, you are not vulnerable.
You can determine if you are using one of the affected wrappers by performing:
To determine if the DVM JDBC wrapper is in use, issue the following statement:
db2 "select servername from syscat.serveroptions where option = 'DRIVER_CLASS' and setting = 'com.rs.jdbc.dv.DvDriver'"
If a servername is returned, then you are using the DVM JDBC wrapper via the DvDriver class.
To determine if the NoSQL hadoop wrapper is in use, issue the following statement:
db2 "select * from syscat.servers where servertype = 'HDFSPARQUET'"
If 1 or more rows are returned, then NoSQL hadoop wrapper is in use.
To determine if the NoSQL Blockchain wrapper is in use, issue the following statement:
db2 "select * from syscat.serveroptions where option='PEER_URL'"
If 1 or more rows are returned, then NoSQL Blockchain wrapper is in use.
Refer to the following reference URLs for remediation and additional vulnerability details:
Source Bulletin: https://www.ibm.com/support/pages/node/6549888
X-Force Database: https://exchange.xforce.ibmcloud.com/vulnerabilities/216189