SUSE: 2020:1511-1 important: java-11-openjdk

    Date 29 May 2020
    175
    Posted By LinuxSecurity Advisories
    An update that fixes 13 vulnerabilities is now available.
    
       SUSE Security Update: Security update for java-11-openjdk
    ______________________________________________________________________________
    
    Announcement ID:    SUSE-SU-2020:1511-1
    Rating:             important
    References:         #1167462 #1169511 
    Cross-References:   CVE-2020-2754 CVE-2020-2755 CVE-2020-2756
                        CVE-2020-2757 CVE-2020-2767 CVE-2020-2773
                        CVE-2020-2778 CVE-2020-2781 CVE-2020-2800
                        CVE-2020-2803 CVE-2020-2805 CVE-2020-2816
                        CVE-2020-2830
    Affected Products:
                        SUSE Linux Enterprise Server for SAP 15
                        SUSE Linux Enterprise Server 15-LTSS
                        SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP2
                        SUSE Linux Enterprise Module for Basesystem 15-SP2
                        SUSE Linux Enterprise Module for Basesystem 15-SP1
                        SUSE Linux Enterprise High Performance Computing 15-LTSS
                        SUSE Linux Enterprise High Performance Computing 15-ESPOS
    ______________________________________________________________________________
    
       An update that fixes 13 vulnerabilities is now available.
    
    Description:
    
       This update for java-11-openjdk fixes the following issues:
    
       Java was updated to jdk-11.0.7+10 (April 2020 CPU, bsc#1169511).
    
       Security issues fixed:
    
       - CVE-2020-2754: Fixed an incorrect handling of regular expressions that
         could have resulted in denial of service (bsc#1169511).
       - CVE-2020-2755: Fixed an incorrect handling of regular expressions that
         could have resulted in denial of service (bsc#1169511).
       - CVE-2020-2756: Fixed an incorrect handling of regular expressions that
         could have resulted in denial of service (bsc#1169511).
       - CVE-2020-2757: Fixed an object deserialization issue that could have
         resulted in denial of service via crafted serialized input (bsc#1169511).
       - CVE-2020-2767: Fixed an incorrect handling of certificate messages
         during TLS handshakes (bsc#1169511).
       - CVE-2020-2773: Fixed the incorrect handling of exceptions thrown by
         unmarshalKeyInfo() and unmarshalXMLSignature() (bsc#1169511).
       - CVE-2020-2778: Fixed the incorrect handling of SSLParameters in
         setAlgorithmConstraints(), which could have been abused to override the
         defined systems security policy and lead to the use of weak crypto
         algorithms (bsc#1169511).
       - CVE-2020-2781: Fixed the incorrect re-use of single null TLS sessions
         (bsc#1169511).
       - CVE-2020-2800: Fixed an HTTP header injection issue caused by
         mishandling of CR/LF in header values (bsc#1169511).
       - CVE-2020-2803: Fixed a boundary check and type check issue that could
         have led to a sandbox bypass (bsc#1169511).
       - CVE-2020-2805: Fixed a boundary check and type check issue that could
         have led to a sandbox bypass (bsc#1169511).
       - CVE-2020-2816: Fixed an incorrect handling of application data packets
         during TLS handshakes  (bsc#1169511).
       - CVE-2020-2830: Fixed an incorrect handling of regular expressions that
         could have resulted in denial of service (bsc#1169511).
    
    
    Patch Instructions:
    
       To install this SUSE Security Update use the SUSE recommended installation methods
       like YaST online_update or "zypper patch".
    
       Alternatively you can run the command listed for your product:
    
       - SUSE Linux Enterprise Server for SAP 15:
    
          zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-2020-1511=1
    
       - SUSE Linux Enterprise Server 15-LTSS:
    
          zypper in -t patch SUSE-SLE-Product-SLES-15-2020-1511=1
    
       - SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP2:
    
          zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2020-1511=1
    
       - SUSE Linux Enterprise Module for Basesystem 15-SP2:
    
          zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP2-2020-1511=1
    
       - SUSE Linux Enterprise Module for Basesystem 15-SP1:
    
          zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP1-2020-1511=1
    
       - SUSE Linux Enterprise High Performance Computing 15-LTSS:
    
          zypper in -t patch SUSE-SLE-Product-HPC-15-2020-1511=1
    
       - SUSE Linux Enterprise High Performance Computing 15-ESPOS:
    
          zypper in -t patch SUSE-SLE-Product-HPC-15-2020-1511=1
    
    
    
    Package List:
    
       - SUSE Linux Enterprise Server for SAP 15 (ppc64le x86_64):
    
          java-11-openjdk-11.0.7.0-3.42.4
          java-11-openjdk-debuginfo-11.0.7.0-3.42.4
          java-11-openjdk-debugsource-11.0.7.0-3.42.4
          java-11-openjdk-demo-11.0.7.0-3.42.4
          java-11-openjdk-devel-11.0.7.0-3.42.4
          java-11-openjdk-headless-11.0.7.0-3.42.4
    
       - SUSE Linux Enterprise Server 15-LTSS (aarch64 s390x):
    
          java-11-openjdk-11.0.7.0-3.42.4
          java-11-openjdk-debuginfo-11.0.7.0-3.42.4
          java-11-openjdk-debugsource-11.0.7.0-3.42.4
          java-11-openjdk-demo-11.0.7.0-3.42.4
          java-11-openjdk-devel-11.0.7.0-3.42.4
          java-11-openjdk-headless-11.0.7.0-3.42.4
    
       - SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP2 (noarch):
    
          java-11-openjdk-javadoc-11.0.7.0-3.42.4
    
       - SUSE Linux Enterprise Module for Basesystem 15-SP2 (aarch64 ppc64le s390x x86_64):
    
          java-11-openjdk-11.0.7.0-3.42.4
          java-11-openjdk-debuginfo-11.0.7.0-3.42.4
          java-11-openjdk-debugsource-11.0.7.0-3.42.4
          java-11-openjdk-demo-11.0.7.0-3.42.4
          java-11-openjdk-devel-11.0.7.0-3.42.4
          java-11-openjdk-headless-11.0.7.0-3.42.4
    
       - SUSE Linux Enterprise Module for Basesystem 15-SP1 (aarch64 ppc64le s390x x86_64):
    
          java-11-openjdk-11.0.7.0-3.42.4
          java-11-openjdk-debuginfo-11.0.7.0-3.42.4
          java-11-openjdk-debugsource-11.0.7.0-3.42.4
          java-11-openjdk-demo-11.0.7.0-3.42.4
          java-11-openjdk-devel-11.0.7.0-3.42.4
          java-11-openjdk-headless-11.0.7.0-3.42.4
    
       - SUSE Linux Enterprise High Performance Computing 15-LTSS (aarch64 x86_64):
    
          java-11-openjdk-11.0.7.0-3.42.4
          java-11-openjdk-debuginfo-11.0.7.0-3.42.4
          java-11-openjdk-debugsource-11.0.7.0-3.42.4
          java-11-openjdk-demo-11.0.7.0-3.42.4
          java-11-openjdk-devel-11.0.7.0-3.42.4
          java-11-openjdk-headless-11.0.7.0-3.42.4
    
       - SUSE Linux Enterprise High Performance Computing 15-ESPOS (aarch64 x86_64):
    
          java-11-openjdk-11.0.7.0-3.42.4
          java-11-openjdk-debuginfo-11.0.7.0-3.42.4
          java-11-openjdk-debugsource-11.0.7.0-3.42.4
          java-11-openjdk-demo-11.0.7.0-3.42.4
          java-11-openjdk-devel-11.0.7.0-3.42.4
          java-11-openjdk-headless-11.0.7.0-3.42.4
    
    
    References:
    
       https://www.suse.com/security/cve/CVE-2020-2754.html
       https://www.suse.com/security/cve/CVE-2020-2755.html
       https://www.suse.com/security/cve/CVE-2020-2756.html
       https://www.suse.com/security/cve/CVE-2020-2757.html
       https://www.suse.com/security/cve/CVE-2020-2767.html
       https://www.suse.com/security/cve/CVE-2020-2773.html
       https://www.suse.com/security/cve/CVE-2020-2778.html
       https://www.suse.com/security/cve/CVE-2020-2781.html
       https://www.suse.com/security/cve/CVE-2020-2800.html
       https://www.suse.com/security/cve/CVE-2020-2803.html
       https://www.suse.com/security/cve/CVE-2020-2805.html
       https://www.suse.com/security/cve/CVE-2020-2816.html
       https://www.suse.com/security/cve/CVE-2020-2830.html
       https://bugzilla.suse.com/1167462
       https://bugzilla.suse.com/1169511
    
    _______________________________________________
    sle-security-updates mailing list
    This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://lists.suse.com/mailman/listinfo/sle-security-updates
    

    LinuxSecurity Poll

    How do you feel about the elimination of the terms 'blacklist' and 'slave' from the Linux kernel?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/32-how-do-you-feel-about-the-elimination-of-the-terms-blacklist-and-slave-from-the-linux-kernel?task=poll.vote&format=json
    32
    radio
    [{"id":"112","title":"I strongly support this change - racially charged language should not be used in the code and documentation of the kernel and other open-source projects.","votes":"7","type":"x","order":"1","pct":18.42,"resources":[]},{"id":"113","title":"I'm indifferent - this small change will not affect broader issues of racial insensitivity and white privilege.","votes":"4","type":"x","order":"2","pct":10.53,"resources":[]},{"id":"114","title":"I'm opposed to this change - there is no need to change language that has been used for years. It doesn't make sense for people to take offense to terminology used in community projects.","votes":"27","type":"x","order":"3","pct":71.05,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350
    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.