IBM Support

Security Bulletin: Vulnerability in IBM Java Runtime affect DB2 Recovery Expert for Linux, Unix and Windows(IBM SDK, Java Technology Edition Quarterly CPU - Jul 2019 - Includes Oracle Jul 2019 CPU) )

Security Bulletin


Summary

DB2 Recovery Expert for Linux, UNIX and Windows has addressed the following vulnerabilities:CVE-2019-4473,CVE-2019-11771. These issues were disclosed as part of the IBM Java SDK updates in July. 2019.

Vulnerability Details

CVEID:   CVE-2019-4473
DESCRIPTION:   Multiple binaries in IBM SDK, Java Technology Edition 7, 7R, and 8 on the AIX platform use insecure absolute RPATHs, which may facilitate code injection and privilege elevation by local users. IBM X-Force ID: 163984.
CVSS Base score: 8.4
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/163984 for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)


CVEID:   CVE-2019-11771
DESCRIPTION:   AIX builds of Eclipse OpenJ9 before 0.15.0 contain unused RPATHs which may facilitate code injection and privilege elevation by local users.
CVSS Base score: 8.4
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/163989 for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

Affected Products and Versions

DB2 Recovery Expert for LUW  5.1
DB2 Recovery Expert for LUW  5.1 Interim Fix 1 (IF1)
DB2 Recovery Expert for LUW  5.1.0.1 (also called 5.1 Fix Pack 1)
DB2 Recovery Expert for LUW  5.1.0.1 IF1
DB2 Recovery Expert for LUW  5.1.0.1 IF2
DB2 Recovery Expert for LUW  5.1.0.2 (also called 5.1 Fix Pack 2)
DB2 Recovery Expert for LUW  5.1.0.2 IF1
DB2 Recovery Expert for LUW  5.1.0.3 (also called 5.1 Fix Pack 3)

DB2 Recovery Expert for LUW  5.5


Remediation/Fixes

ProductVRMFRemediation/First Fix
DB2 Recovery Expert for Linux, Unix and WindowsHad been fixed in V5.5 IF 0https://www-945.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm%7EInformation%20Management&product=ibm/Information+Management/DB2+Recovery+Expert+for+Linux+UNIX+and+Windows&release=5.5&platform=AIX&function=all

Workarounds and Mitigations

There are no workarounds except to replace to the latest JRE.
To solve the problem without updating the entire Recovery Expert product, the user can replace the existing JRE that is installed into the product installation tree in the “jre” directory with a newer JRE that includes the security fixes.

Instructions to replace the IBM JRE for DB2 Recovery Expert for Linux, UNIX and Windows

1. Identify the version and platform of your DB2 Recovery Expert installation.
2. See the table below to find the IBM JRE download link that matches your product version and platform. If you cannot find a JRE download link for your product version and platform, contact IBM Technical Support and refer to this tech-note
3. Download the zip file (for example: ibm-java-jre-x.x-x.x-linux-x86_64.tgz) and extract it to a folder on a local file system (for example: /tmp/ibm-jre-x.x-x.x).
4. Stop the DB2 Recovery Expert server using the stop.sh command (for example: /opt/ibm/RE/stop.sh).
5. Back-up and then delete the contents of the “jre” folder from your product installation directory (for example: /opt/ibm/RE/jre).
6. Copy the contents of the “jre” folder from the latest IBM JRE that you downloaded in Step 3 (for example: /tmp/ibm-jre-x.x-x.x/jre/) to the “jre” folder in your product installation directory (for example: /opt/ibm/RE/jre/).*
7. Ensure that the file permissions for the new JRE files and folders match the file permissions for the original JRE files and folders. If necessary, set 775 recursively.
8. Restart the DB2 Recovery Expert server using the start.sh command (for example: /opt/ibm/RE/start.sh).

* NOTE: You must repeat from Step 6 again any time you install an APAR or upgrade to an affected version of DB2 Recovery Expert.

Get Notified about Future Security Bulletins

References

Off

Change History

11 Dec 2019: Initial Publication

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.

Document Location

Worldwide

[{"Business Unit":{"code":"BU059","label":"IBM Software w\/o TPS"},"Product":{"code":"SS8QJD","label":"DB2 Recovery Expert for Linux, UNIX and Windows"},"Component":"All","Platform":[{"code":"PF002","label":"AIX"}],"Version":"5.1.x,5.5","Edition":"All","Line of Business":{"code":"LOB10","label":"Data and AI"}}]

Document Information

Modified date:
20 December 2019

UID

ibm11128093