Security update for java-1_7_0-ibm
Announcement ID: | SUSE-SU-2020:14587-1 |
---|---|
Rating: | moderate |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves eight vulnerabilities can now be installed.
Description:
This update for java-1_7_0-ibm fixes the following issues:
- Update to Java 7.0 Service Refresh 10 Fix Pack 75 [bsc#1180063, bsc#1177943] CVE-2020-14792 CVE-2020-14797 CVE-2020-14782 CVE-2020-14781 CVE-2020-14779 CVE-2020-14798 CVE-2020-14796 CVE-2020-14803
- Class Libraries:
- Z/OS specific C function send_file is changing the file pointer position
- Security:
- Add the new oracle signer certificate
- Certificate parsing error
- JVM memory growth can be caused by the IBMPKCS11IMPL crypto provider
- Remove check for websphere signed jars
- sessionid.hashcode generates too many collisions
- The Java 8 IBM certpath provider does not honor the user specified system property for CLR connect timeout
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Point of Service 11 SP3
zypper in -t patch sleposp3-java-1_7_0-ibm-14587=1
Package List:
-
SUSE Linux Enterprise Point of Service 11 SP3 (nosrc i586)
- java-1_7_0-ibm-1.7.0_sr10.75-65.57.1
-
SUSE Linux Enterprise Point of Service 11 SP3 (i586)
- java-1_7_0-ibm-jdbc-1.7.0_sr10.75-65.57.1
- java-1_7_0-ibm-devel-1.7.0_sr10.75-65.57.1
- java-1_7_0-ibm-alsa-1.7.0_sr10.75-65.57.1
- java-1_7_0-ibm-plugin-1.7.0_sr10.75-65.57.1
References:
- https://www.suse.com/security/cve/CVE-2020-14779.html
- https://www.suse.com/security/cve/CVE-2020-14781.html
- https://www.suse.com/security/cve/CVE-2020-14782.html
- https://www.suse.com/security/cve/CVE-2020-14792.html
- https://www.suse.com/security/cve/CVE-2020-14796.html
- https://www.suse.com/security/cve/CVE-2020-14797.html
- https://www.suse.com/security/cve/CVE-2020-14798.html
- https://www.suse.com/security/cve/CVE-2020-14803.html
- https://bugzilla.suse.com/show_bug.cgi?id=1177943
- https://bugzilla.suse.com/show_bug.cgi?id=1180063