Security Bulletin
Summary
DB2 Recovery Expert for Linux, UNIX and Windows has addressed the following vulnerabilities:CVE-2019-4473,CVE-2019-11771. These issues were disclosed as part of the IBM Java SDK updates in July. 2019.
Vulnerability Details
CVEID: CVE-2019-4473
DESCRIPTION: Multiple binaries in IBM SDK, Java Technology Edition 7, 7R, and 8 on the AIX platform use insecure absolute RPATHs, which may facilitate code injection and privilege elevation by local users. IBM X-Force ID: 163984.
CVSS Base score: 8.4
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/163984 for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
CVEID: CVE-2019-11771
DESCRIPTION: AIX builds of Eclipse OpenJ9 before 0.15.0 contain unused RPATHs which may facilitate code injection and privilege elevation by local users.
CVSS Base score: 8.4
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/163989 for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
Affected Products and Versions
DB2 Recovery Expert for LUW 5.1
DB2 Recovery Expert for LUW 5.1 Interim Fix 1 (IF1)
DB2 Recovery Expert for LUW 5.1.0.1 (also called 5.1 Fix Pack 1)
DB2 Recovery Expert for LUW 5.1.0.1 IF1
DB2 Recovery Expert for LUW 5.1.0.1 IF2
DB2 Recovery Expert for LUW 5.1.0.2 (also called 5.1 Fix Pack 2)
DB2 Recovery Expert for LUW 5.1.0.2 IF1
DB2 Recovery Expert for LUW 5.1.0.3 (also called 5.1 Fix Pack 3)
DB2 Recovery Expert for LUW 5.5
Remediation/Fixes
Product | VRMF | Remediation/First Fix |
DB2 Recovery Expert for Linux, Unix and Windows | Had been fixed in V5.5 IF 0 | https://www-945.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm%7EInformation%20Management&product=ibm/Information+Management/DB2+Recovery+Expert+for+Linux+UNIX+and+Windows&release=5.5&platform=AIX&function=all |
Workarounds and Mitigations
There are no workarounds except to replace to the latest JRE.
To solve the problem without updating the entire Recovery Expert product, the user can replace the existing JRE that is installed into the product installation tree in the “jre” directory with a newer JRE that includes the security fixes.
Instructions to replace the IBM JRE for DB2 Recovery Expert for Linux, UNIX and Windows
1. Identify the version and platform of your DB2 Recovery Expert installation.
2. See the table below to find the IBM JRE download link that matches your product version and platform. If you cannot find a JRE download link for your product version and platform, contact IBM Technical Support and refer to this tech-note
3. Download the zip file (for example: ibm-java-jre-x.x-x.x-linux-x86_64.tgz) and extract it to a folder on a local file system (for example: /tmp/ibm-jre-x.x-x.x).
4. Stop the DB2 Recovery Expert server using the stop.sh command (for example: /opt/ibm/RE/stop.sh).
5. Back-up and then delete the contents of the “jre” folder from your product installation directory (for example: /opt/ibm/RE/jre).
6. Copy the contents of the “jre” folder from the latest IBM JRE that you downloaded in Step 3 (for example: /tmp/ibm-jre-x.x-x.x/jre/) to the “jre” folder in your product installation directory (for example: /opt/ibm/RE/jre/).*
7. Ensure that the file permissions for the new JRE files and folders match the file permissions for the original JRE files and folders. If necessary, set 775 recursively.
8. Restart the DB2 Recovery Expert server using the start.sh command (for example: /opt/ibm/RE/start.sh).
* NOTE: You must repeat from Step 6 again any time you install an APAR or upgrade to an affected version of DB2 Recovery Expert.
Get Notified about Future Security Bulletins
References
Change History
11 Dec 2019: Initial Publication
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
Disclaimer
Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.
Document Location
Worldwide
Was this topic helpful?
Document Information
Modified date:
20 December 2019
UID
ibm11128093