High Severity

Security Bulletin: IBM Security Guardium is affected by FasterXML jackson-databind vulnerabilities (CVE-2020-25649, X-Force ID 217968)

Share this post:

IBM Security Guardium has fixed these vulnerabilities.

CVE(s): CVE-2020-25649, IBM X-Force ID:   217968

Affected product(s) and affected version(s):

Affected Product(s) Version(s)
IBM Security Guardium 10.6
IBM Security Guardium 11.0
IBM Security Guardium 11.1
IBM Security Guardium 11.2
IBM Security Guardium 11.3
IBM Security Guardium 11.4

Refer to the following reference URLs for remediation and additional vulnerability details:  
Source Bulletin: https://www.ibm.com/support/pages/node/6573001
X-Force Database: https://exchange.xforce.ibmcloud.com/vulnerabilities/192648

More stories

Security Bulletin: IBM App Connect Enterprise Certified Container may be vulnerable to arbitrary code execution due to CVE-2022-1304

December 1, 2022 | High Severity

e2fsprogs is provided as an operating system module in the IBM App Connect Enterprise Certified Container images. IBM App Connect Enterprise Certified Container images may be vulnerable to arbitrary code execution. This bulletin provides patch information to address the reported vulnerability CVE-2022-1304 in e2fsprogs. ...read more


Security Bulletin: Vulnerabilities with Kernel and GNU glibc affect IBM Cloud Object Storage Systems (Dec 2022v1)

December 1, 2022 | High Severity

Vulnerabilities with Kernel and GNU glibc affect IBM Cloud Object Storage Systems. These vulnerabilities have been addressed in the latest ClevOS releases ...read more


Security Bulletin: IBM Watson Speech Services Cartridge for IBM Cloud Pak for Data is vulnerable to a heap-based buffer overflow in Vim (CVE-2022-1621)

December 1, 2022 | High Severity

IBM Watson Speech Services Cartridge for IBM Cloud Pak for Data is vulnerable to a heap-based buffer overflow in Vim (CVE-2022-1621) caused by improper bounds checking in the vim_strncpy find_word component. Vim is used as part of the base image included in our service components. Please read the details for remediation below. ...read more