RHSA-2020_0556

Vulnerability from csaf_redhat - Published: 2020-02-19 20:52 - Updated: 2024-05-02 15:56
Summary
Red Hat Security Advisory: Open Liberty 20.0.0.2 Runtime security update
Severity
Important
Notes
Topic: Open Liberty 20.0.0.2 Runtime is now available from the Customer Portal. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details: This release of Open Liberty 20.0.0.2 serves as a replacement for Open Liberty 20.0.0.1 and includes security fixes, bug fixes, and enhancements. For specific information about this release, see links in the References section. Security Fix(es): * WebSphere Application Server is vulnerable to a denial of service (CVE-2019-4720) * Vulnerability in Apache CXF affects WebSphere Application Server (CVE-2019-12406) For more details about the security issue(s), see the IBM Security Bulletin links for each CVE, listed in the References section.
Terms of Use: This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_informational_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Open Liberty 20.0.0.2 Runtime is now available from the Customer Portal.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "This release of Open Liberty 20.0.0.2 serves as a replacement for Open Liberty 20.0.0.1 and includes security fixes, bug fixes, and enhancements. For specific information about this release, see links in the References section.\n\nSecurity Fix(es):\n\n* WebSphere Application Server is vulnerable to a denial of service (CVE-2019-4720)\n\n* Vulnerability in Apache CXF affects WebSphere Application Server (CVE-2019-12406)\n\nFor more details about the security issue(s), see the IBM Security Bulletin links for each CVE, listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2020:0556",
        "url": "https://access.redhat.com/errata/RHSA-2020:0556"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=open.liberty\u0026version=20.0.0.2",
        "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=open.liberty\u0026version=20.0.0.2"
      },
      {
        "category": "external",
        "summary": "https://www.ibm.com/support/pages/security-bulletin-websphere-application-server-vulnerable-denial-service-cve-2019-4720",
        "url": "https://www.ibm.com/support/pages/security-bulletin-websphere-application-server-vulnerable-denial-service-cve-2019-4720"
      },
      {
        "category": "external",
        "summary": "https://www.ibm.com/support/pages/security-bulletin-vulnerability-apache-cxf-affects-websphere-application-server-cve-2019-12406",
        "url": "https://www.ibm.com/support/pages/security-bulletin-vulnerability-apache-cxf-affects-websphere-application-server-cve-2019-12406"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/articles/4544981",
        "url": "https://access.redhat.com/articles/4544981"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/documentation/en-us/open_liberty/2020/",
        "url": "https://access.redhat.com/documentation/en-us/open_liberty/2020/"
      },
      {
        "category": "external",
        "summary": "IBMRT-18",
        "url": "https://issues.redhat.com/browse/IBMRT-18"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2020/rhsa-2020_0556.json"
      }
    ],
    "title": "Red Hat Security Advisory: Open Liberty 20.0.0.2 Runtime security update",
    "tracking": {
      "current_release_date": "2024-05-02T15:56:03+00:00",
      "generator": {
        "date": "2024-05-02T15:56:03+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "3.29.2"
        }
      },
      "id": "RHSA-2020:0556",
      "initial_release_date": "2020-02-19T20:52:51+00:00",
      "revision_history": [
        {
          "date": "2020-02-19T20:52:51+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2020-02-19T20:52:51+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-05-02T15:56:03+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Open Liberty",
                "product": {
                  "name": "Open Liberty",
                  "product_id": "Open Liberty",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:openliberty:20"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Open Liberty"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ]
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…