IBM Support

Security Bulletin: Multiple vulnerabilities in IBM MQ Operator and Queue manager container images

Security Bulletin


Summary

Multiple vulnerabilities were addressed in IBM MQ Operator and Queue manager container images

Vulnerability Details

CVEID:   CVE-2025-32988
DESCRIPTION:   A flaw was found in GnuTLS. A double-free vulnerability exists in GnuTLS due to incorrect ownership handling in the export logic of Subject Alternative Name (SAN) entries containing an otherName. If the type-id OID is invalid or malformed, GnuTLS will call asn1_delete_structure() on an ASN.1 node it does not own, leading to a double-free condition when the parent function or caller later attempts to free the same structure. This vulnerability can be triggered using only public GnuTLS APIs and may result in denial of service or memory corruption, depending on allocator behavior.
CWE:   CWE-415: Double Free
CVSS Source:   NVD
CVSS Base score:   8.2
CVSS Vector:   (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H)

CVEID:   CVE-2025-32990
DESCRIPTION:   A heap-buffer-overflow (off-by-one) flaw was found in the GnuTLS software in the template parsing logic within the certtool utility. When it reads certain settings from a template file, it allows an attacker to cause an out-of-bounds (OOB) NULL pointer write, resulting in memory corruption and a denial-of-service (DoS) that could potentially crash the system.
CWE:   CWE-122: Heap-based Buffer Overflow
CVSS Source:   NVD
CVSS Base score:   8.2
CVSS Vector:   (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H)

CVEID:   CVE-2025-54410
DESCRIPTION:   Moby is an open source container framework developed by Docker Inc. that is distributed as Docker Engine, Mirantis Container Runtime, and various other downstream projects/products. A firewalld vulnerability affects Moby releases before 28.0.0. When firewalld reloads, Docker fails to re-create iptables rules that isolate bridge networks, allowing any container to access all ports on any other container across different bridge networks on the same host. This breaks network segmentation between containers that should be isolated, creating significant risk in multi-tenant environments. Only containers in --internal networks remain protected. Workarounds include reloading firewalld and either restarting the docker daemon, re-creating bridge networks, or using rootless mode. Maintainers anticipate a fix for this issue in version 25.0.13.
CWE:   CWE-909: Missing Initialization of Resource
CVSS Source:   NVD
CVSS Base score:   5.2
CVSS Vector:   (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N)

CVEID:   CVE-2025-6395
DESCRIPTION:   A NULL pointer dereference flaw was found in the GnuTLS software in _gnutls_figure_common_ciphersuite().
CWE:   CWE-476: NULL Pointer Dereference
CVSS Source:   secalert@redhat.com
CVSS Base score:   6.5
CVSS Vector:   (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H)

CVEID:   CVE-2025-32989
DESCRIPTION:   A heap-buffer-overread vulnerability was found in GnuTLS in how it handles the Certificate Transparency (CT) Signed Certificate Timestamp (SCT) extension during X.509 certificate parsing. This flaw allows a malicious user to create a certificate containing a malformed SCT extension (OID 1.3.6.1.4.1.11129.2.4.2) that contains sensitive data. This issue leads to the exposure of confidential information when GnuTLS verifies certificates from certain websites when the certificate (SCT) is not checked correctly.
CWE:   CWE-295: Improper Certificate Validation
CVSS Source:   secalert@redhat.com
CVSS Base score:   5.3
CVSS Vector:   (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)

CVEID:   CVE-2024-40635
DESCRIPTION:   containerd is an open-source container runtime. A bug was found in containerd prior to versions 1.6.38, 1.7.27, and 2.0.4 where containers launched with a User set as a `UID:GID` larger than the maximum 32-bit signed integer can cause an overflow condition where the container ultimately runs as root (UID 0). This could cause unexpected behavior for environments that require containers to run as a non-root user. This bug has been fixed in containerd 1.6.38, 1.7.27, and 2.04. As a workaround, ensure that only trusted images are used and that only trusted users have permissions to import images.
CWE:   CWE-190: Integer Overflow or Wraparound
CVSS Source:   NVD
CVSS Base score:   7.8
CVSS Vector:   (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)

CVEID:   CVE-2025-22872
DESCRIPTION:   The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can result in content following such tags as being placed in the wrong scope during DOM construction, but only when tags are in foreign content (e.g. , , etc contexts).
CVSS Source:   CISA ADP
CVSS Base score:   6.5
CVSS Vector:   (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L)

Affected Products and Versions

Affected Product(s)Version(s)
IBM MQ Operator

SC2: v3.2.0 - v3.2.16

CD:  v3.3.0, v3.4.0, v3.4.1, v3.5.0, v3.5.1 - v3.5.3, v3.6.0 - v3.6.3

LTS: v2.0.0 - 2.0.29

IBM supplied MQ Advanced container images

SC2: 9.4.0.6-r1, 9.4.0.6-r2, 9.4.0.7-r1, 9.4.0.10-r1, 9.4.0.10-r2, 9.4.0.11-r1, 9.4.0.11-r2, 9.4.0.11-r3, 9.4.0.12-r1, 9.4.0.15-r1, 9.4.0.15-r2 

CD: 9.4.1.0-r1, 9.4.1.0-r2, 9.4.1.1-r1, 9.4.2.0-r1, 9.4.2.0-r2, 9.4.2.1-r1, 9.4.2.1-r2, 9.4.3.0-r1, 9.4.3.0-r2, 9.4.3.1-r1, 9.4.3.1-r2

LTS: 9.3.0.0-r1, 9.3.0.0-r2, 9.3.0.0-r3, 9.3.0.1-r1, 9.3.0.1-r2, 9.3.0.1-r3, 9.3.0.1-r4, 9.3.0.3-r1, 9.3.0.4-r1, 9.3.0.4-r2, 9.3.0.5-r1, 9.3.0.5-r2, 9.3.0.5-r3, 9.3.0.6-r1, 9.3.0.10-r1, 9.3.0.10-r2, 9.3.0.11-r1,9.3.0.11-r2, 9.3.0.15-r1, 9.3.0.16-r1, 9.3.0.16-r2, 9.3.0.17-r1, 9.3.0.17-r2, 9.3.0.17-r3, 9.3.0.20-r1, 9.3.0.20-r2, 9.3.0.21-r1, 9.3.0.21-r2, 9.3.0.21-r3, 9.3.0.25-r1, 9.4.0.0-r1, 9.4.0.0-r2, 9.4.0.0-r3, 9.4.0.5-r1, 9.4.0.5-r2 

 

Remediation/Fixes

Issues mentioned by this security bulletin are addressed in -

  • IBM MQ Operator v3.7.0 CD release that included IBM supplied MQ Advanced 9.4.4.0-r1 container image. 
  • IBM MQ Operator v3.2.17 SC2 release that included IBM supplied MQ Advanced 9.4.0.15-r3 container image.
  • IBM MQ Container 9.4.4.0-r1 release.

IBM strongly recommends applying the latest container images. 

IBM MQ Operator v3.7.0 CD release details:

Image

Fix Version

Registry

Image Location

ibm-mq-operator

v3.7.0

icr.io

icr.io/cpopen/ibm-mq-operator@sha256:0d272a620c741606374e3bca516515d9647822c28180c12ea59ef8c3e4b7e05f

ibm-mqadvanced-server

9.4.4.0-r1

cp.icr.io

cp.icr.io/cp/ibm-mqadvanced-server@sha256:372af169ac9ada409b99fc47f4f2f23b7ba7807542316436770b1a3b686349c6

ibm-mqadvanced-server-integration

9.4.4.0-r1

cp.icr.io

cp.icr.io/cp/ibm-mqadvanced-server-integration@sha256:e358ebad1203f209aa639e3de1f58df5a12953e3cb4abad4bf4d491046d028a7

ibm-mqadvanced-server-dev

9.4.4.0-r1

icr.io

icr.io/ibm-messaging/ibm-mqadvanced-server-dev@sha256:53b0c80992466416bb40769284a6f8484c3e5ab1bd1c8d2e37968974c706077d


IBM MQ Operator v3.2.17 SC2 release details:

Image

Fix Version

Registry

Image Location

ibm-mq-operator

v3.2.17

icr.io

icr.io/cpopen/ibm-mq-operator@sha256:1689aee00414b1c1f37146df9395339b57f16ab611ee81b529db9c1a8bd14fcd

ibm-mqadvanced-server

9.4.0.15-r3

cp.icr.io

cp.icr.io/cp/ibm-mqadvanced-server@sha256:c6301559f641a301544b2fbc006b6f7bca05b0dc074c7bf03448a28ed7471ce2

ibm-mqadvanced-server-integration

9.4.0.15-r3

cp.icr.io

cp.icr.io/cp/ibm-mqadvanced-server-integration@sha256:986d5ca2a977b7a4f3df5643574c258aae178ed7c080a0d920e9122419b9d263

ibm-mqadvanced-server-dev

9.4.0.15-r3

icr.io

icr.io/ibm-messaging/ibm-mqadvanced-server-dev@sha256:219d537ee85f79251f48992896bb90bbcb000a8a2e77942696329925cee20cf9

 

IBM MQ Container 9.4.4.0-r1 release details:

Image

Fix Version

Registry

Image Location

ibm-mqadvanced-server

9.4.4.0-r1

cp.icr.io

cp.icr.io/cp/ibm-mqadvanced-server@sha256:372af169ac9ada409b99fc47f4f2f23b7ba7807542316436770b1a3b686349c6

ibm-mqadvanced-server-dev

9.4.4.0-r1

icr.io

icr.io/ibm-messaging/ibm-mqadvanced-server-dev@sha256:53b0c80992466416bb40769284a6f8484c3e5ab1bd1c8d2e37968974c706077d

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

References

Off

Acknowledgement

Change History

16 Oct 2025: Initial Publication

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY. In addition to other efforts to address potential vulnerabilities, IBM periodically updates the record of components contained in our product offerings. As part of that effort, if IBM identifies previously unidentified packages in a product/service inventory, we address relevant vulnerabilities regardless of CVE date. Inclusion of an older CVEID does not demonstrate that the referenced product has been used by IBM since that date, nor that IBM was aware of a vulnerability as of that date. We are making clients aware of relevant vulnerabilities as we become aware of them. "Affected Products and Versions" referenced in IBM Security Bulletins are intended to be only products and versions that are supported by IBM and have not passed their end-of-support or warranty date. Thus, failure to reference unsupported or extended-support products and versions in this Security Bulletin does not constitute a determination by IBM that they are unaffected by the vulnerability. Reference to one or more unsupported versions in this Security Bulletin shall not create an obligation for IBM to provide fixes for any unsupported or extended-support products or versions.

Document Location

Worldwide

[{"Business Unit":{"code":"BU048","label":"IBM Software"},"Product":{"code":"SSFE2G","label":"IBM MQ container software"},"Component":"","Platform":[{"code":"PF040","label":"RedHat OpenShift"}],"Version":"IBM MQ Operator v3.7.0, IBM MQ Operator v3.2.17, IBM MQ Container 9.4.4.0-r1","Edition":"","Line of Business":{"code":"LOB77","label":"Automation Platform"}}]

Document Information

Modified date:
16 October 2025

UID

ibm17248131