IBM Support

Security Bulletin: IBM MQ Operator and Queue manager container images are vulnerable to multiple vulnerabilities from gzip, jackson-databind, libssh, gnutls, nettle and zlib

Security Bulletin


Summary

Multiple issues were identified in Red Hat UBI(ubi8/ubi-minimal) v8.5-x packages gzip, libssh, gnutls, nettle, zlib and jackson-databind that were shipped with IBM MQ Operator and IBM supplied MQ Advanced container images.

Vulnerability Details

CVEID:   CVE-2021-3634
DESCRIPTION:   libssh is vulnerable to a heap-based buffer overflow, caused by improper bounds checking. By sending a specially-crafted request, a remote authenticated attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.
CVSS Base score: 5.4
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/208281 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L)

CVEID:   CVE-2022-1271
DESCRIPTION:   GNU gzip could allow a remote authenticated attacker to bypass security restrictions, caused by improper validation of file name by the zgrep utility. By using a specially-crafted file name, an attacker could exploit this vulnerability to write arbitrary files on the system.
CVSS Base score: 7.1
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/223754 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H)

CVEID:   CVE-2021-3580
DESCRIPTION:   GNU Nettle is vulnerable to a denial of service, caused by a flaw in the RSA decryption functions. By sending specially-crafted ciphertext, a remote attacker could exploit this vulnerability to cause the application to crash.
CVSS Base score: 5.9
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/204056 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID:   CVE-2020-36518
DESCRIPTION:   FasterXML jackson-databind is vulnerable to a denial of service, caused by a Java StackOverflow exception. By using a large depth of nested objects, a remote attacker could exploit this vulnerability to cause a denial of service.
CVSS Base score: 7.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/222319 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID:   CVE-2018-25032
DESCRIPTION:   Zlib is vulnerable to a denial of service, caused by a memory corruption in the deflate operation. By using many distant matches, a remote attacker could exploit this vulnerability to cause the application to crash.
CVSS Base score: 7.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/222615 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

Affected Products and Versions

Affected Product(s)Version(s)
IBM MQ Operator CD release1.8.1
IBM MQ Operator EUS release1.3.3
IBM Supplied MQ Advanced Queue Manager Container images9.2.5.0-r2, 9.2.0.5-r1

Remediation/Fixes

Issues listed by this security bulletin are addressed in IBM MQ Operator 1.8.2 CD release that included IBM supplied MQ Advanced 9.2.5.0-r3 container images and IBM MQ Operator 1.3.4 EUS release that included IBM supplied MQ Advanced 9.2.0.5-r2 container images.

 

IBM MQ Operator 1.8.2 CD release details:

ImageFix VersionRegistryImage Location
ibm-mq-operator1.8.2icr.ioicr.io/cpopen/ibm-mq-operator@sha256:3cb8a3021a434a656eeff95e285d525158a8372c14ec04c1a234d9b639640e23
ibm-mqadvanced-server9.2.5.0-r3cp.icr.iocp.icr.io/cp/ibm-mqadvanced-server@sha256:2442d0bcb0b0b78ac61e66fbdb5bb5d0fc117d9912a8c95046d6a544036620e2
ibm-mqadvanced-server-integration9.2.5.0-r3cp.icr.iocp.icr.io/cp/ibm-mqadvanced-server-integration@sha256:69c2e6440964e847cce19dbd68aabb5fa51b338a49836b1e202aa57c184c2614
ibm-mqadvanced-server-dev9.2.5.0-r3icr.ioicr.io/ibm-messaging/mq@sha256:febe3fbf180fd844e9d94fb48b954b84a0f20a0c1dd6052f3ce4e1545d379c9a

 

IBM MQ Operator 1.3.4 EUS release details:

ImageFix VersionRegistryImage Location
ibm-mq-operator1.3.4icr.ioicr.io/cpopen/ibm-mq-operator@sha256:c98d3ee1f619cd9b33793a5180961654636eb48393be9e42335363fb3b683877
ibm-mqadvanced-server-integration9.2.0.5-r2-euscp.icr.iocp.icr.io/cp/ibm-mqadvanced-server-integration@sha256:c17795de836bb9b553682b4b22f9b78f98232291c99383f570a83d7fdd25afec

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

References

Off

Change History

24 May 2022: Initial Publication

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.

Document Location

Worldwide

[{"Business Unit":{"code":"BU059","label":"IBM Software w\/o TPS"},"Product":{"code":"SSFE2G","label":"IBM MQ certified container software"},"Component":"","Platform":[{"code":"PF040","label":"RedHat OpenShift"}],"Version":"IBM MQ Operator CD v1.8.x, IBM MQ Operator EUS v1.3.x and IBM supplied MQ Advanced Server Container images v9.2.5.0, v9.2.0.5","Edition":"","Line of Business":{"code":"LOB45","label":"Automation"}}]

Document Information

Modified date:
25 May 2022

UID

ibm16589939