Security update for java-1_8_0-ibm
Announcement ID: | SUSE-SU-2020:1684-1 |
---|---|
Rating: | important |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves 11 vulnerabilities can now be installed.
Description:
This update for java-1_8_0-ibm fixes the following issues:
java-1_8_0-ibm was updated to Java 8.0 Service Refresh 6 Fix Pack 10 (bsc#1172277,bsc#1169511,bsc#1160968)
- CVE-2020-2654: Fixed an issue which could have resulted in unauthorized ability to cause a partial denial of service
- CVE-2020-2754: Forwarded references to Nashorn
- CVE-2020-2755: Improved Nashorn matching
- CVE-2020-2756: Improved mapping of serial ENUMs
- CVE-2020-2757: Less Blocking Array Queues
- CVE-2020-2781: Improved TLS session handling
- CVE-2020-2800: Improved Headings for HTTP Servers
- CVE-2020-2803: Enhanced buffering of byte buffers
- CVE-2020-2805: Enhanced typing of methods
- CVE-2020-2830: Improved Scanner conversions
- CVE-2019-2949: Fixed an issue which could have resulted in unauthorized access to critical data
- Added RSA PSS SUPPORT TO IBMPKCS11IMPL
- The pack200 and unpack200 alternatives should be slaves of java (bsc#1171352).
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
Legacy Module 15-SP1
zypper in -t patch SUSE-SLE-Module-Legacy-15-SP1-2020-1684=1
-
Legacy Module 15-SP2
zypper in -t patch SUSE-SLE-Module-Legacy-15-SP2-2020-1684=1
-
SUSE Linux Enterprise Server 15 LTSS 15
zypper in -t patch SUSE-SLE-Product-SLES-15-2020-1684=1
-
SUSE Linux Enterprise Server for SAP Applications 15
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-2020-1684=1
Package List:
-
Legacy Module 15-SP1 (nosrc ppc64le s390x x86_64)
- java-1_8_0-ibm-1.8.0_sr6.10-3.38.1
-
Legacy Module 15-SP1 (ppc64le s390x x86_64)
- java-1_8_0-ibm-devel-1.8.0_sr6.10-3.38.1
-
Legacy Module 15-SP1 (x86_64)
- java-1_8_0-ibm-plugin-1.8.0_sr6.10-3.38.1
- java-1_8_0-ibm-alsa-1.8.0_sr6.10-3.38.1
-
Legacy Module 15-SP2 (nosrc ppc64le s390x x86_64)
- java-1_8_0-ibm-1.8.0_sr6.10-3.38.1
-
Legacy Module 15-SP2 (ppc64le s390x x86_64)
- java-1_8_0-ibm-devel-1.8.0_sr6.10-3.38.1
-
Legacy Module 15-SP2 (x86_64)
- java-1_8_0-ibm-plugin-1.8.0_sr6.10-3.38.1
- java-1_8_0-ibm-alsa-1.8.0_sr6.10-3.38.1
-
SUSE Linux Enterprise Server 15 LTSS 15 (nosrc ppc64le s390x x86_64)
- java-1_8_0-ibm-1.8.0_sr6.10-3.38.1
-
SUSE Linux Enterprise Server 15 LTSS 15 (ppc64le s390x x86_64)
- java-1_8_0-ibm-devel-1.8.0_sr6.10-3.38.1
-
SUSE Linux Enterprise Server 15 LTSS 15 (x86_64)
- java-1_8_0-ibm-plugin-1.8.0_sr6.10-3.38.1
- java-1_8_0-ibm-alsa-1.8.0_sr6.10-3.38.1
-
SUSE Linux Enterprise Server for SAP Applications 15 (nosrc ppc64le x86_64)
- java-1_8_0-ibm-1.8.0_sr6.10-3.38.1
-
SUSE Linux Enterprise Server for SAP Applications 15 (ppc64le x86_64)
- java-1_8_0-ibm-devel-1.8.0_sr6.10-3.38.1
-
SUSE Linux Enterprise Server for SAP Applications 15 (x86_64)
- java-1_8_0-ibm-plugin-1.8.0_sr6.10-3.38.1
- java-1_8_0-ibm-alsa-1.8.0_sr6.10-3.38.1
References:
- https://www.suse.com/security/cve/CVE-2019-2949.html
- https://www.suse.com/security/cve/CVE-2020-2654.html
- https://www.suse.com/security/cve/CVE-2020-2754.html
- https://www.suse.com/security/cve/CVE-2020-2755.html
- https://www.suse.com/security/cve/CVE-2020-2756.html
- https://www.suse.com/security/cve/CVE-2020-2757.html
- https://www.suse.com/security/cve/CVE-2020-2781.html
- https://www.suse.com/security/cve/CVE-2020-2800.html
- https://www.suse.com/security/cve/CVE-2020-2803.html
- https://www.suse.com/security/cve/CVE-2020-2805.html
- https://www.suse.com/security/cve/CVE-2020-2830.html
- https://bugzilla.suse.com/show_bug.cgi?id=1160968
- https://bugzilla.suse.com/show_bug.cgi?id=1169511
- https://bugzilla.suse.com/show_bug.cgi?id=1171352
- https://bugzilla.suse.com/show_bug.cgi?id=1172277