IBM Support

IT43329: IBM STORAGE INSIGHTS SECURITY APAR FOR CVE-2022-41881, CVE-2022-41915

Subscribe to this APAR

By subscribing, you receive periodic emails alerting you to the status of the APAR, along with a link to the fix after it becomes available. You can track this item individually or track all items by product.

Notify me when this APAR changes.

Notify me when an APAR for this component changes.

 

APAR status

  • Closed as program error.

Error description

  • CVEID: CVE-2022-41881
    Description: Netty project is an event-driven asynchronous
    network application framework. In versions prior to
    4.1.86.Final, a StackOverflowError can be raised when parsing a
    malformed crafted message due to an infinite recursion. This
    issue is patched in version 4.1.86.Final. There is no
    workaround, except using a custom HaProxyMessageDecoder.
    
    
    CVEID: CVE-2022-41915
    Description: Netty project is an event-driven asynchronous
    network application framework. In versions prior to
    4.1.86.Final, when calling `DefaultHttpHeadesr.set` with an
    _iterator_ of values, header value validation was not performed,
    allowing malicious header values in the iterator to perform HTTP
    Response Splitting. This issue has been patched in version
    4.1.86.Final. Integrators can work around the issue by changing
    the `DefaultHttpHeaders.set(CharSequence, Iterator<?>)` call,
    into a `remove()` call, and call `add()` in a loop over the
    iterator of values.
    

Local fix

Problem summary

  • ****************************************************************
    * USERS AFFECTED:                                              *
    * IBM Storage Insights users                                   *
    *                                                              *
    ****************************************************************
    * PROBLEM DESCRIPTION:                                         *
    * SECURITY APAR FOR:                                           *
    * CVE-2022-41881, CVE-2022-41915                               *
    ****************************************************************
    * RECOMMENDATION:                                              *
    ****************************************************************
    

Problem conclusion

  • The fix for this APAR is contained in the following release:
    
    IBM Storage Insights 1Q23   [ 54X-IBM-SI ]
    ( 1Q 2023 / March )
    
    To protect IBM Storage Insights against emerging
    security vulnerabilities, the service was updated to
    protected against vulnerabilities.
    
    No action is required, there is nothing that you need
    to do following the IBM Storage Insights upgrade.
    

Temporary fix

Comments

APAR Information

  • APAR number

    IT43329

  • Reported component name

    STORAGE INSIGHT

  • Reported component ID

    5608TPCSI

  • Reported release

    54X

  • Status

    CLOSED PER

  • PE

    NoPE

  • HIPER

    NoHIPER

  • Special Attention

    NoSpecatt / Xsystem

  • Submitted date

    2023-03-10

  • Closed date

    2023-03-14

  • Last modified date

    2023-03-14

  • APAR is sysrouted FROM one or more of the following:

  • APAR is sysrouted TO one or more of the following:

Fix information

  • Fixed component name

    STORAGE INSIGHT

  • Fixed component ID

    5608TPCSI

Applicable component levels

[{"Business Unit":{"code":"BU029","label":"Software"},"Product":{"code":"SSYS7R","label":"IBM Spectrum Control Storage Insights"},"Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"54X"}]

Document Information

Modified date:
15 March 2023