Security update for java-1_7_0-ibm
Announcement ID: | SUSE-SU-2020:14391-1 |
---|---|
Rating: | important |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves eight vulnerabilities can now be installed.
Description:
This update for java-1_7_0-ibm fixes the following issues:
java-1_7_1-ibm was updated to Java 7.1 Service Refresh 4 Fix Pack 65 (bsc#1172277 and bsc#1169511)
- CVE-2020-2654: Fixed an issue which could have resulted in unauthorized ability to cause a partial denial of service
- CVE-2020-2756: Improved mapping of serial ENUMs
- CVE-2020-2757: Less Blocking Array Queues
- CVE-2020-2781: Improved TLS session handling
- CVE-2020-2800: Improved Headings for HTTP Servers
- CVE-2020-2803: Enhanced buffering of byte buffers
- CVE-2020-2805: Enhanced typing of methods
- CVE-2020-2830: Improved Scanner conversions
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Point of Service 11 SP3
zypper in -t patch sleposp3-java-1_7_0-ibm-14391=1
Package List:
-
SUSE Linux Enterprise Point of Service 11 SP3 (nosrc i586)
- java-1_7_0-ibm-1.7.0_sr10.65-65.51.1
-
SUSE Linux Enterprise Point of Service 11 SP3 (i586)
- java-1_7_0-ibm-plugin-1.7.0_sr10.65-65.51.1
- java-1_7_0-ibm-alsa-1.7.0_sr10.65-65.51.1
- java-1_7_0-ibm-jdbc-1.7.0_sr10.65-65.51.1
- java-1_7_0-ibm-devel-1.7.0_sr10.65-65.51.1
References:
- https://www.suse.com/security/cve/CVE-2020-2654.html
- https://www.suse.com/security/cve/CVE-2020-2756.html
- https://www.suse.com/security/cve/CVE-2020-2757.html
- https://www.suse.com/security/cve/CVE-2020-2781.html
- https://www.suse.com/security/cve/CVE-2020-2800.html
- https://www.suse.com/security/cve/CVE-2020-2803.html
- https://www.suse.com/security/cve/CVE-2020-2805.html
- https://www.suse.com/security/cve/CVE-2020-2830.html
- https://bugzilla.suse.com/show_bug.cgi?id=1169511
- https://bugzilla.suse.com/show_bug.cgi?id=1172277