Lucene search

K
ibmIBM8CF75CE76A214C8E66E3A8881ED4D041C386151E2AD24B89D0E7F34885082D9F
HistoryJul 08, 2022 - 7:37 a.m.

Security Bulletin: IBM MQ Operator and Queue manager container images are vulnerable to an issue in OPM and Golang Go packages (CVE-2020-15257, CVE-2021-21334 and CVE-2021-41771)

2022-07-0807:37:48
www.ibm.com
10

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.004 Low

EPSS

Percentile

73.1%

Summary

IBM MQ Operator catalog container image is vulnerable to an issue in OPM package from Red Hat openshift4/ose-operator-registry and IBM MQ Operator, IBM Supplied Queue Manager container images are vulnerable to an issue in the Golang Go packages. (CVE-2020-15257, CVE-2021-21334 and CVE-2021-41771)

Vulnerability Details

CVEID:CVE-2020-15257
**DESCRIPTION:**Containerd could allow a remote authenticated attacker to gain elevated privileges on the system, caused by improper access control in containerd-shim API. By sending a specially-crafted request, an attacker could exploit this vulnerability to cause new processes to be run with elevated privileges.
CVSS Base score: 9.8
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/192452 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

CVEID:CVE-2021-21334
**DESCRIPTION:**containerd could allow a remote attacker to obtain sensitive information, caused by a flaw in the CRI implementation. By launching containers that uses the containerd CRI service, an attacker could exploit this vulnerability to obtain environment variables information, and use this information to launch further attacks against the affected system.
CVSS Base score: 7.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/198079 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)

CVEID:CVE-2021-41771
**DESCRIPTION:**Golang Go is vulnerable to a denial of service, caused by an out-of-bounds slice situation in the ImportedSymbols function in debug/macho. By using specially-crafted binaries, a remote attacker could exploit this vulnerability to cause a panic, and results in a denial of service condition.
CVSS Base score: 7.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/213016 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

Affected Products and Versions

Affected Product(s) Version(s)
IBM MQ Operator CD release 1.8.2

Remediation/Fixes

Issues listed by this security bulletin are addressed in IBM MQ Operator 2.0.0 LTS release that include IBM MQ Operator catalog image and IBM supplied MQ Advanced v9.3.0.0 Queue Manager container images

IBM MQ Operator 2.0.0 LTS release details:

Image Fix Version Registry Image Location
ibm-mq-operator-catalog 2.0.0 icr.io icr.io/cpopen/ibm-mq-operator-catalog@sha256:f658de5cfcc72090d9e313a01ff310a9a291f17988592da44a47ac23b3d9107f
ibm-mq-operator 2.0.0 icr.io icr.io/cpopen/ibm-mq-operator@sha256:f53b77d87d33467b7d439cc0392ad78c8e5d4d836ddd02c4dadd4f38fe4ce39f
ibm-mqadvanced-server 9.3.0.0-r1 cp.icr.io cp.icr.io/cp/ibm-mqadvanced-server@sha256:e9ad4295710088158163bedea4addf78dbfa245f4ec72b5e46655c5829ef4e78
ibm-mqadvanced-server-integration 9.3.0.0-r1 cp.icr.io cp.icr.io/cp/ibm-mqadvanced-server-integration@sha256:0639d6d84c18ec8c477e47c29f604725f07b47ea50f23e4eaffae4e440d75fed
ibm-mqadvanced-server-dev 9.3.0.0-r1 icr.io icr.io/ibm-messaging/mq@sha256:37aa67ad20656ab76303a70388da23be68e78a2de2bcec2e3106ccee2f7ab5e3

Workarounds and Mitigations

None

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.004 Low

EPSS

Percentile

73.1%