RHSA-2020:2054

Vulnerability from csaf_redhat - Published: 2020-05-11 13:36 - Updated: 2024-05-02 15:33
Summary
Red Hat Security Advisory: Open Liberty 20.0.0.5 Runtime security update
Severity
Important
Notes
Topic: Open Liberty 20.0.0.5 Runtime is now available from the Customer Portal. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details: Open Liberty is a lightweight open framework for building fast and efficient cloud-native Java microservices. This release of Open Liberty 20.0.0.5 serves as a replacement for Open Liberty 20.0.0.4 and includes security fixes, bug fixes, and enhancements. For specific information about this release, see links in the References section. Security Fix(es): * Information disclosure in WebSphere Application Server (CVE-2020-4329) * Potential spoofing attack in Webshere Application Server (CVE-2020-4421) For more details about the security issue(s), see the IBM Security Bulletin links for each CVE, listed in the References section.
Terms of Use: This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_informational_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Open Liberty 20.0.0.5 Runtime is now available from the Customer Portal.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Open Liberty is a lightweight open framework for building fast and efficient cloud-native Java microservices. \n\nThis release of Open Liberty 20.0.0.5 serves as a replacement for Open Liberty 20.0.0.4 and includes security fixes, bug fixes, and enhancements. For specific information about this release, see links in the References section.\n\nSecurity Fix(es):\n\n* Information disclosure in WebSphere Application Server (CVE-2020-4329)\n\n* Potential spoofing attack in Webshere Application Server (CVE-2020-4421)\n\nFor more details about the security issue(s), see the IBM Security Bulletin links for each CVE, listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2020:2054",
        "url": "https://access.redhat.com/errata/RHSA-2020:2054"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=open.liberty\u0026downloadType=distributions\u0026version=20.0.0.5",
        "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=open.liberty\u0026downloadType=distributions\u0026version=20.0.0.5"
      },
      {
        "category": "external",
        "summary": "https://www.ibm.com/support/pages/node/6201862",
        "url": "https://www.ibm.com/support/pages/node/6201862"
      },
      {
        "category": "external",
        "summary": "https://www.ibm.com/support/pages/node/6205926",
        "url": "https://www.ibm.com/support/pages/node/6205926"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/articles/4544981",
        "url": "https://access.redhat.com/articles/4544981"
      },
      {
        "category": "external",
        "summary": "IBMRT-26",
        "url": "https://issues.redhat.com/browse/IBMRT-26"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2020/rhsa-2020_2054.json"
      }
    ],
    "title": "Red Hat Security Advisory: Open Liberty 20.0.0.5 Runtime security update",
    "tracking": {
      "current_release_date": "2024-05-02T15:33:49+00:00",
      "generator": {
        "date": "2024-05-02T15:33:49+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "3.29.2"
        }
      },
      "id": "RHSA-2020:2054",
      "initial_release_date": "2020-05-11T13:36:59+00:00",
      "revision_history": [
        {
          "date": "2020-05-11T13:36:59+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2020-05-11T13:36:59+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-05-02T15:33:49+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Open Liberty",
                "product": {
                  "name": "Open Liberty",
                  "product_id": "Open Liberty",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:openliberty:20"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Open Liberty"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ]
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…