Lucene search

K
ibmIBM38C6FAA43D515FBDBB3FC17B6AD58597AC874D5D00D5B76D0C715F9056E26E51
HistoryJun 10, 2024 - 8:24 p.m.

Security Bulletin: Updating Java in Identity Insight 10.0.0.0 for security update

2024-06-1020:24:53
www.ibm.com
10
ibm infosphere identity insight
openjdk 17.0.10.0
security update
cve-2024-20952
cve-2024-20945
cve-2024-20926
cve-2024-20921
cve-2024-20919
cve-2024-20918
cve-2023-33850
cve-2023-5676
remediation instructions

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

6.8 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

43.0%

Summary

Identity Insight customers are advised to update OpenJDK 17 to version 17.0.11.0 for the security update in Java.

Vulnerability Details

Refer to the security bulletin(s) listed in the Remediation/Fixes section

Affected Products and Versions

Affected Product(s) Version(s)
IBM InfoSphere Identity Insight 10.0.0.0

Remediation/Fixes

The listed vulnerability issues are addressed.

CVE-ID Description
CVE-2024-21094
CVE-2024-21085
CVE-2024-21011 An unspecified vulnerability in Java SE related to the VM component could allow a remote attacker to cause low confidentiality impact, low integrity impact, and low availability impact.
CVE-2024-20952 An unspecified vulnerability in Java SE related to the Security component could allow a remote attacker to cause high confidentiality impact and high integrity impact.
CVE-2024-20945 An unspecified vulnerability in Java SE related to the VM component could allow a local authenticated attacker to cause high confidentiality impact.
CVE-2024-20926 An unspecified vulnerability in Java SE related to the Scripting component could allow a remote attacker to cause high confidentiality impact.

CVE-2024-20921

CVE-2024-20919

CVE-2024-20918

| An unspecified vulnerability in Java SE related to the VM component could allow a remote attacker to cause high confidentiality impact and high integrity impact.
CVE-2023-38264 | IBM SDK, Java Technology Edition’s Object Request Broker (ORB) is vulnerable to a denial of service attack in some circumstances due to improper enforcement of the JEP 290 MaxRef and MaxDepth deserialization filters.
CVE-2023-33850 | IBM GSKit-Crypto could allow a remote attacker to obtain sensitive information, caused by a timing-based side channel in the RSA Decryption implementation. By sending an overly large number of trial messages for decryption, an attacker could exploit this vulnerability to obtain sensitive information.
CVE-2023-5676 | In Eclipse OpenJ9 before version 0.41.0, the JVM can be forced into an infinite busy hang on a spinlock or a segmentation fault if a shutdown signal (SIGTERM, SIGINT or SIGHUP) is received before the JVM has finished initializing.

Steps

This section provides instructions on how to update OpenJDK used in IBM InfoSphere Identity Insight (II) 10.0.0.0 to OpenJDK 17.0.11.0.

  1. Download OpenJDK 17.0.11.0 for the desired platform.
    * Windows : <https://github.com/ibmruntimes/semeru17-binaries/releases/download/jdk-17.0.11%2B9_openj9-0.44.0/ibm-semeru-open-jdk_x64_windows_17.0.11_9_openj9-0.44.0.zip&gt;
    * Linux : <https://github.com/ibmruntimes/semeru17-binaries/releases/download/jdk-17.0.11%2B9_openj9-0.44.0/ibm-semeru-open-jdk_x64_linux_17.0.11_9_openj9-0.44.0.tar.gz&gt;
    * AIX : <https://github.com/ibmruntimes/semeru17-binaries/releases/download/jdk-17.0.11%2B9_openj9-0.44.0/ibm-semeru-open-jdk_ppc64_aix_17.0.11_9_openj9-0.44.0.tar.gz&gt;

  2. Stop Liberty Server.
    Windows
    <ii_install_dir>\bin\stopIIServer.bat
    Linux/AIX
    <ii_install_dir>/bin/stopIIServer

  3. Backup the java directory in the <ii_install_dir> by renaming it.
    * Find out what version of the current java in <ii_install_dir>.
    Windows
    <ii_instal_dir>\java\bin\java -version
    Linux/AIX
    <ii_install_dir>/java/bin/java -version
    * Rename the java directory to java__<version>, substitute <version> with the version number of the current java.
    Windows
    move <ii_install_dir>\java <ii_install_dir>\java
    <version>
    Linux/AIX
    mv <ii_install_dir>/java <ii_install_dir>/java_<version>

  4. Extract the downloaded file under <ii_install_dir>. A ‘jdk-17.0.11+9’ is placed under <ii_install_dir>.

  5. Rename ‘jdk-17.0.11+9’ to ‘java’.
    Windows
    move <ii_install_dir>\jdk-17.0.11+9 <ii_install_dir>\java
    Linux/AIX
    mv <ii_install_dir>/jdk-17.0.11+9 <ii_instal_dir>/java

  6. If Liberty Server connects to DB2 database in SSL, add sslVersion parameter in db.xml file.
    <dataSource id=“DefaultDataSource” jndiName=“jdbc/pipeline” type=“javax.sql.DataSource”>
    <jdbcDriver libraryRef=“DB2Lib”/>
    <properties.db2.jcc databaseName=“dbName
    serverName=“dbHost
    user=“db2User
    password=“dbUserPwd
    portNumber=“dbPort
    **sslVersion=“TLSv1.2” **ssLConnection=“true” />
    </dataSource>

  7. Verify the updated Java is used in Identity Insight.
    * Restart Liberty Server.
    Windows
    <ii_install_dir>\bin\startIIServer.bat
    Linux/AIX
    <ii_install_dir>/bin/startIIServer
    * View <ii_install_dir>/wlp/usr/servers/iiServer/logs/messages.log. Java used by Liberty Server is shown at the beginning of the file.

Workarounds and Mitigations

None

Affected configurations

Vulners
Node
ibminfosphere_identity_insightMatch10.0.0.0
CPENameOperatorVersion
infosphere identity insighteq10.0.0.0

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

6.8 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

43.0%