TLP : CLEAR
Date : 02/08/2024
REF NO : CERT / 2024/08/68
Severity Level: Medium
Components Affected
IBM MQ Operator:
IBM supplied MQ Advanced container images:
Overview
Multiple vulnerabilities were identified in IBM MQ. A remote attacker could exploit some of these vulnerabilities to trigger denial of service condition and security restriction bypass on the targeted system.
Description
Several security vulnerabilities have been identified across various tools and libraries. In runc versions 1.1.11 and earlier, an internal file descriptor leak could allow an attacker to cause a newly-spawned container process to have a working directory in the host filesystem namespace, leading to potential container escapes and host filesystem access. This vulnerability has been patched in runc 1.1.12. Similarly, libxml2 versions before 2.11.7 and 2.12.x before 2.12.5 are vulnerable to a use-after-free issue when processing crafted XML documents with DTD validation and XInclude expansion enabled. In Kerberos 5 (krb5) version 1.21.2, a memory leak vulnerability was discovered in the k5sealv3.c file. Additionally, the jose package, which implements Javascript Object Signing and Encryption standards, was found to be vulnerable to an attack where a JWE containing compressed data could consume excessive memory and CPU resources when decompressed. This issue has been addressed in versions 4.0.1, 3.0.3, and 2.6.3.
Impact
Solution/ Workarounds
Before installation of the software, please visit the vendor web-site for more details.
Apply fixes issued by the vendor:
Reference
Disclaimer : The information provided herein is on an “as is” basis, without warranty of any kind.
Sri Lanka Computer Emergency Readiness Team | Coordination Centre