Security update for java-1_7_1-ibm
Announcement ID: | SUSE-SU-2022:14927-1 |
---|---|
Rating: | important |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves 17 vulnerabilities can now be installed.
Description:
This update for java-1_7_1-ibm fixes the following issues:
Update Java 7.1 to Service Refresh 7 Fix Pack 5 (bsc#1197126).
Including fixes for the following vulnerabilities:
CVE-2022-21366, CVE-2022-21365, CVE-2022-21360, CVE-2022-21349, CVE-2022-21341, CVE-2022-21340, CVE-2022-21305, CVE-2022-21277, CVE-2022-21299, CVE-2022-21296, CVE-2022-21282, CVE-2022-21294, CVE-2022-21293, CVE-2022-21291, CVE-2022-21283, CVE-2022-21248, CVE-2022-21271.
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Server 11 SP4 LTSS 11-SP4
zypper in -t patch slessp4-java-1_7_1-ibm-14927=1
-
SUSE Linux Enterprise Server 11 SP4
zypper in -t patch slessp4-java-1_7_1-ibm-14927=1
Package List:
-
SUSE Linux Enterprise Server 11 SP4 LTSS 11-SP4 (s390x x86_64 i586 ppc64 nosrc)
- java-1_7_1-ibm-1.7.1_sr5.5-26.71.2
-
SUSE Linux Enterprise Server 11 SP4 LTSS 11-SP4 (x86_64 i586)
- java-1_7_1-ibm-alsa-1.7.1_sr5.5-26.71.2
- java-1_7_1-ibm-plugin-1.7.1_sr5.5-26.71.2
-
SUSE Linux Enterprise Server 11 SP4 LTSS 11-SP4 (ppc64 s390x x86_64 i586)
- java-1_7_1-ibm-devel-1.7.1_sr5.5-26.71.2
- java-1_7_1-ibm-jdbc-1.7.1_sr5.5-26.71.2
-
SUSE Linux Enterprise Server 11 SP4 (s390x x86_64 i586 ppc64 nosrc)
- java-1_7_1-ibm-1.7.1_sr5.5-26.71.2
-
SUSE Linux Enterprise Server 11 SP4 (x86_64 i586)
- java-1_7_1-ibm-alsa-1.7.1_sr5.5-26.71.2
- java-1_7_1-ibm-plugin-1.7.1_sr5.5-26.71.2
-
SUSE Linux Enterprise Server 11 SP4 (ppc64 s390x x86_64 i586)
- java-1_7_1-ibm-devel-1.7.1_sr5.5-26.71.2
- java-1_7_1-ibm-jdbc-1.7.1_sr5.5-26.71.2
References:
- https://www.suse.com/security/cve/CVE-2022-21248.html
- https://www.suse.com/security/cve/CVE-2022-21271.html
- https://www.suse.com/security/cve/CVE-2022-21277.html
- https://www.suse.com/security/cve/CVE-2022-21282.html
- https://www.suse.com/security/cve/CVE-2022-21283.html
- https://www.suse.com/security/cve/CVE-2022-21291.html
- https://www.suse.com/security/cve/CVE-2022-21293.html
- https://www.suse.com/security/cve/CVE-2022-21294.html
- https://www.suse.com/security/cve/CVE-2022-21296.html
- https://www.suse.com/security/cve/CVE-2022-21299.html
- https://www.suse.com/security/cve/CVE-2022-21305.html
- https://www.suse.com/security/cve/CVE-2022-21340.html
- https://www.suse.com/security/cve/CVE-2022-21341.html
- https://www.suse.com/security/cve/CVE-2022-21349.html
- https://www.suse.com/security/cve/CVE-2022-21360.html
- https://www.suse.com/security/cve/CVE-2022-21365.html
- https://www.suse.com/security/cve/CVE-2022-21366.html
- https://bugzilla.suse.com/show_bug.cgi?id=1194925
- https://bugzilla.suse.com/show_bug.cgi?id=1194926
- https://bugzilla.suse.com/show_bug.cgi?id=1194927
- https://bugzilla.suse.com/show_bug.cgi?id=1194928
- https://bugzilla.suse.com/show_bug.cgi?id=1194929
- https://bugzilla.suse.com/show_bug.cgi?id=1194930
- https://bugzilla.suse.com/show_bug.cgi?id=1194931
- https://bugzilla.suse.com/show_bug.cgi?id=1194932
- https://bugzilla.suse.com/show_bug.cgi?id=1194933
- https://bugzilla.suse.com/show_bug.cgi?id=1194934
- https://bugzilla.suse.com/show_bug.cgi?id=1194935
- https://bugzilla.suse.com/show_bug.cgi?id=1194937
- https://bugzilla.suse.com/show_bug.cgi?id=1194939
- https://bugzilla.suse.com/show_bug.cgi?id=1194940
- https://bugzilla.suse.com/show_bug.cgi?id=1194941
- https://bugzilla.suse.com/show_bug.cgi?id=1196500
- https://bugzilla.suse.com/show_bug.cgi?id=1197126