<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for java-1_7_1-ibm</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2021:14634-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2021-02-19T09:35:35Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2021-02-19T09:35:35Z</InitialReleaseDate>
    <CurrentReleaseDate>2021-02-19T09:35:35Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for java-1_7_1-ibm</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for java-1_7_1-ibm fixes the following issues:

- Update to Java 7.1 Service Refresh 4 Fix Pack 80
  [bsc#1182186, bsc#1181239, CVE-2020-27221, CVE-2020-14803]
  * CVE-2020-27221: Potential for a stack-based buffer overflow
    when the virtual machine or JNI natives are converting from
    UTF-8 characters to platform encoding.
  * CVE-2020-14803: Unauthenticated attacker with network access
    via multiple protocols allows to compromise Java SE.
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">slessp4-java-1_7_1-ibm-14634</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114634-1/</URL>
      <Description>Link for SUSE-SU-2021:14634-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2021-February/008347.html</URL>
      <Description>E-Mail link for SUSE-SU-2021:14634-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1181239</URL>
      <Description>SUSE Bug 1181239</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1182186</URL>
      <Description>SUSE Bug 1182186</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-14803/</URL>
      <Description>SUSE CVE CVE-2020-14803 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-27221/</URL>
      <Description>SUSE CVE CVE-2020-27221 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 11 SP4-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS" CPE="cpe:/o:suse:suse_sles:11:sp4">SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="java-1_7_1-ibm-1.7.1_sr4.80-26.65.1">
      <FullProductName ProductID="java-1_7_1-ibm-1.7.1_sr4.80-26.65.1">java-1_7_1-ibm-1.7.1_sr4.80-26.65.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="java-1_7_1-ibm-alsa-1.7.1_sr4.80-26.65.1">
      <FullProductName ProductID="java-1_7_1-ibm-alsa-1.7.1_sr4.80-26.65.1">java-1_7_1-ibm-alsa-1.7.1_sr4.80-26.65.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="java-1_7_1-ibm-devel-1.7.1_sr4.80-26.65.1">
      <FullProductName ProductID="java-1_7_1-ibm-devel-1.7.1_sr4.80-26.65.1">java-1_7_1-ibm-devel-1.7.1_sr4.80-26.65.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="java-1_7_1-ibm-jdbc-1.7.1_sr4.80-26.65.1">
      <FullProductName ProductID="java-1_7_1-ibm-jdbc-1.7.1_sr4.80-26.65.1">java-1_7_1-ibm-jdbc-1.7.1_sr4.80-26.65.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="java-1_7_1-ibm-plugin-1.7.1_sr4.80-26.65.1">
      <FullProductName ProductID="java-1_7_1-ibm-plugin-1.7.1_sr4.80-26.65.1">java-1_7_1-ibm-plugin-1.7.1_sr4.80-26.65.1</FullProductName>
    </Branch>
    <Relationship ProductReference="java-1_7_1-ibm-1.7.1_sr4.80-26.65.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.80-26.65.1">java-1_7_1-ibm-1.7.1_sr4.80-26.65.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_7_1-ibm-alsa-1.7.1_sr4.80-26.65.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.80-26.65.1">java-1_7_1-ibm-alsa-1.7.1_sr4.80-26.65.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_7_1-ibm-devel-1.7.1_sr4.80-26.65.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.80-26.65.1">java-1_7_1-ibm-devel-1.7.1_sr4.80-26.65.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_7_1-ibm-jdbc-1.7.1_sr4.80-26.65.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.80-26.65.1">java-1_7_1-ibm-jdbc-1.7.1_sr4.80-26.65.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_7_1-ibm-plugin-1.7.1_sr4.80-26.65.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.80-26.65.1">java-1_7_1-ibm-plugin-1.7.1_sr4.80-26.65.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 11.0.8 and 15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).</Note>
    </Notes>
    <CVE>CVE-2020-14803</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.80-26.65.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.80-26.65.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.80-26.65.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.80-26.65.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.80-26.65.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114634-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-14803.html</URL>
        <Description>CVE-2020-14803</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1177943</URL>
        <Description>SUSE Bug 1177943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1181239</URL>
        <Description>SUSE Bug 1181239</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1182186</URL>
        <Description>SUSE Bug 1182186</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Eclipse OpenJ9 up to and including version 0.23, there is potential for a stack-based buffer overflow when the virtual machine or JNI natives are converting from UTF-8 characters to platform encoding.</Note>
    </Notes>
    <CVE>CVE-2020-27221</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.80-26.65.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.80-26.65.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.80-26.65.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.80-26.65.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.80-26.65.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114634-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-27221.html</URL>
        <Description>CVE-2020-27221</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1182186</URL>
        <Description>SUSE Bug 1182186</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
