Security Bulletin: Multiple operator framework security vulnerabilities may affect IBM Robotic Process Automation for Cloud Pak
Discription

## Summary

symlink is used by IBM Robotic Process Automation for Cloud Pak as part of the operator framework (CVE-2015-3627). Distribution is used by IBM Robotic Process Automation as part of the operator framework (CVE-2023-2253).

## Vulnerability Details

** CVEID: **[CVE-2015-3627]()
** DESCRIPTION: **A symlink vulnerability in Libcontainer and Docker Engine regarding the file-descriptor being opened prior to performing the chroot could allow a local attacker to gain elevated privileges on the system. An attacker could exploit this vulnerability using a specially crafted Dockerfile or image to gain elevated privileges on the system.
CVSS Base score: 4.6
CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/103092]() for the current score.
CVSS Vector: (AV:L/AC:L/Au:N/C:P/I:P/A:P)

** CVEID: **[CVE-2023-2253]()
** DESCRIPTION: **Distribution is vulnerable to a denial of service, caused by improper input validation by the /v2/_catalog endpoint. By sending a specially crafted /v2/_catalog API endpoint request request, a remote attacker could exploit this vulnerability to cause a denial of service condition.
CVSS Base score: 7.5
CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/254846]() for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

## Affected Products and Versions

Affected Product(s)| Version(s)
—|—
IBM Robotic Process Automation for Cloud Pak| 21.0.1-21.0.7.6, 23.0.0 – 23.0.6

## Remediation/Fixes

**IBM strongly recommends addressing the vulnerability now.**

**Product(s)**| **Version(s) number and/or range **| **Remediation/Fix/Instructions**
—|—|—
IBM Robotic Process Automation for Cloud Pak| 21.0.1 – 21.0.7.6| Update to 21.0.7.7 or higher using the following [instructions]( “” ).
IBM Robotic Process Automation for Cloud Pak| 23.0.0 – 23.0.6| Update to 23.0.7 or higher using the following [instructions]( “” ).

## Workarounds and Mitigations

None

##Read More

Back to Main

Subscribe for the latest news: