Security update for java-1_7_0-ibm
| Announcement ID: | SUSE-SU-2022:14926-1 | 
|---|---|
| Rating: | important | 
| References: | |
| Cross-References: | |
| CVSS scores: | 
                    
  | 
            
| Affected Products: | 
                
  | 
        
An update that solves 17 vulnerabilities can now be installed.
Description:
This update for java-1_7_0-ibm fixes the following issues:
Update Java 7.0 to Service Refresh 11 Fix Pack 5 (bsc#1197126).
Including fixes for the following vulnerabilities:
CVE-2022-21366, CVE-2022-21365, CVE-2022-21360, CVE-2022-21349, CVE-2022-21341, CVE-2022-21340, CVE-2022-21305, CVE-2022-21277, CVE-2022-21299, CVE-2022-21296, CVE-2022-21282, CVE-2022-21294, CVE-2022-21293, CVE-2022-21291, CVE-2022-21283, CVE-2022-21248, CVE-2022-21271.
Patch Instructions:
        To install this SUSE  update use the SUSE recommended
        installation methods like YaST online_update or "zypper patch".
        Alternatively you can run the command listed for your product:
    
- 
                SUSE Linux Enterprise Point of Service 11 SP3
                
                    
                        
zypper in -t patch sleposp3-java-1_7_0-ibm-14926=1 
Package List:
- 
                    SUSE Linux Enterprise Point of Service 11 SP3 (nosrc i586)
                    
- java-1_7_0-ibm-1.7.0_sr11.5-65.66.1
 
 - 
                    SUSE Linux Enterprise Point of Service 11 SP3 (i586)
                    
- java-1_7_0-ibm-plugin-1.7.0_sr11.5-65.66.1
 - java-1_7_0-ibm-alsa-1.7.0_sr11.5-65.66.1
 - java-1_7_0-ibm-jdbc-1.7.0_sr11.5-65.66.1
 - java-1_7_0-ibm-devel-1.7.0_sr11.5-65.66.1
 
 
References:
- https://www.suse.com/security/cve/CVE-2022-21248.html
 - https://www.suse.com/security/cve/CVE-2022-21271.html
 - https://www.suse.com/security/cve/CVE-2022-21277.html
 - https://www.suse.com/security/cve/CVE-2022-21282.html
 - https://www.suse.com/security/cve/CVE-2022-21283.html
 - https://www.suse.com/security/cve/CVE-2022-21291.html
 - https://www.suse.com/security/cve/CVE-2022-21293.html
 - https://www.suse.com/security/cve/CVE-2022-21294.html
 - https://www.suse.com/security/cve/CVE-2022-21296.html
 - https://www.suse.com/security/cve/CVE-2022-21299.html
 - https://www.suse.com/security/cve/CVE-2022-21305.html
 - https://www.suse.com/security/cve/CVE-2022-21340.html
 - https://www.suse.com/security/cve/CVE-2022-21341.html
 - https://www.suse.com/security/cve/CVE-2022-21349.html
 - https://www.suse.com/security/cve/CVE-2022-21360.html
 - https://www.suse.com/security/cve/CVE-2022-21365.html
 - https://www.suse.com/security/cve/CVE-2022-21366.html
 - https://bugzilla.suse.com/show_bug.cgi?id=1194925
 - https://bugzilla.suse.com/show_bug.cgi?id=1194926
 - https://bugzilla.suse.com/show_bug.cgi?id=1194927
 - https://bugzilla.suse.com/show_bug.cgi?id=1194928
 - https://bugzilla.suse.com/show_bug.cgi?id=1194929
 - https://bugzilla.suse.com/show_bug.cgi?id=1194930
 - https://bugzilla.suse.com/show_bug.cgi?id=1194931
 - https://bugzilla.suse.com/show_bug.cgi?id=1194932
 - https://bugzilla.suse.com/show_bug.cgi?id=1194933
 - https://bugzilla.suse.com/show_bug.cgi?id=1194934
 - https://bugzilla.suse.com/show_bug.cgi?id=1194935
 - https://bugzilla.suse.com/show_bug.cgi?id=1194937
 - https://bugzilla.suse.com/show_bug.cgi?id=1194939
 - https://bugzilla.suse.com/show_bug.cgi?id=1194940
 - https://bugzilla.suse.com/show_bug.cgi?id=1194941
 - https://bugzilla.suse.com/show_bug.cgi?id=1196500
 - https://bugzilla.suse.com/show_bug.cgi?id=1197126