Security update for java-1_7_0-ibm
Announcement ID: | SUSE-SU-2022:14926-1 |
---|---|
Rating: | important |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves 17 vulnerabilities can now be installed.
Description:
This update for java-1_7_0-ibm fixes the following issues:
Update Java 7.0 to Service Refresh 11 Fix Pack 5 (bsc#1197126).
Including fixes for the following vulnerabilities:
CVE-2022-21366, CVE-2022-21365, CVE-2022-21360, CVE-2022-21349, CVE-2022-21341, CVE-2022-21340, CVE-2022-21305, CVE-2022-21277, CVE-2022-21299, CVE-2022-21296, CVE-2022-21282, CVE-2022-21294, CVE-2022-21293, CVE-2022-21291, CVE-2022-21283, CVE-2022-21248, CVE-2022-21271.
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Point of Service 11 SP3
zypper in -t patch sleposp3-java-1_7_0-ibm-14926=1
Package List:
-
SUSE Linux Enterprise Point of Service 11 SP3 (nosrc i586)
- java-1_7_0-ibm-1.7.0_sr11.5-65.66.1
-
SUSE Linux Enterprise Point of Service 11 SP3 (i586)
- java-1_7_0-ibm-plugin-1.7.0_sr11.5-65.66.1
- java-1_7_0-ibm-alsa-1.7.0_sr11.5-65.66.1
- java-1_7_0-ibm-jdbc-1.7.0_sr11.5-65.66.1
- java-1_7_0-ibm-devel-1.7.0_sr11.5-65.66.1
References:
- https://www.suse.com/security/cve/CVE-2022-21248.html
- https://www.suse.com/security/cve/CVE-2022-21271.html
- https://www.suse.com/security/cve/CVE-2022-21277.html
- https://www.suse.com/security/cve/CVE-2022-21282.html
- https://www.suse.com/security/cve/CVE-2022-21283.html
- https://www.suse.com/security/cve/CVE-2022-21291.html
- https://www.suse.com/security/cve/CVE-2022-21293.html
- https://www.suse.com/security/cve/CVE-2022-21294.html
- https://www.suse.com/security/cve/CVE-2022-21296.html
- https://www.suse.com/security/cve/CVE-2022-21299.html
- https://www.suse.com/security/cve/CVE-2022-21305.html
- https://www.suse.com/security/cve/CVE-2022-21340.html
- https://www.suse.com/security/cve/CVE-2022-21341.html
- https://www.suse.com/security/cve/CVE-2022-21349.html
- https://www.suse.com/security/cve/CVE-2022-21360.html
- https://www.suse.com/security/cve/CVE-2022-21365.html
- https://www.suse.com/security/cve/CVE-2022-21366.html
- https://bugzilla.suse.com/show_bug.cgi?id=1194925
- https://bugzilla.suse.com/show_bug.cgi?id=1194926
- https://bugzilla.suse.com/show_bug.cgi?id=1194927
- https://bugzilla.suse.com/show_bug.cgi?id=1194928
- https://bugzilla.suse.com/show_bug.cgi?id=1194929
- https://bugzilla.suse.com/show_bug.cgi?id=1194930
- https://bugzilla.suse.com/show_bug.cgi?id=1194931
- https://bugzilla.suse.com/show_bug.cgi?id=1194932
- https://bugzilla.suse.com/show_bug.cgi?id=1194933
- https://bugzilla.suse.com/show_bug.cgi?id=1194934
- https://bugzilla.suse.com/show_bug.cgi?id=1194935
- https://bugzilla.suse.com/show_bug.cgi?id=1194937
- https://bugzilla.suse.com/show_bug.cgi?id=1194939
- https://bugzilla.suse.com/show_bug.cgi?id=1194940
- https://bugzilla.suse.com/show_bug.cgi?id=1194941
- https://bugzilla.suse.com/show_bug.cgi?id=1196500
- https://bugzilla.suse.com/show_bug.cgi?id=1197126