First published: Wed Dec 16 2020(Updated: )
IBM Java SE version 7 Release 1 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit.<br>This update upgrades IBM Java SE 7 to version 7R1 SR4-FP75.<br>Security Fix(es):<br><li> OpenJDK: Credentials sent over unencrypted LDAP connection (JNDI, 8237990) (CVE-2020-14781)</li> <li> OpenJDK: Certificate blacklist bypass via alternate certificate encodings (Libraries, 8237995) (CVE-2020-14782)</li> <li> OpenJDK: Incomplete check for invalid characters in URI to path conversion (Libraries, 8242685) (CVE-2020-14797)</li> <li> OpenJDK: High memory usage during deserialization of Proxy class with many interfaces (Serialization, 8236862) (CVE-2020-14779)</li> <li> OpenJDK: Missing permission check in path to URI conversion (Libraries, 8242680) (CVE-2020-14796)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/java | <1.7.1-ibm-1.7.1.4.75-1jpp.1.el7 | 1.7.1-ibm-1.7.1.4.75-1jpp.1.el7 |
redhat/java | <1.7.1-ibm-demo-1.7.1.4.75-1jpp.1.el7 | 1.7.1-ibm-demo-1.7.1.4.75-1jpp.1.el7 |
redhat/java | <1.7.1-ibm-devel-1.7.1.4.75-1jpp.1.el7 | 1.7.1-ibm-devel-1.7.1.4.75-1jpp.1.el7 |
redhat/java | <1.7.1-ibm-jdbc-1.7.1.4.75-1jpp.1.el7 | 1.7.1-ibm-jdbc-1.7.1.4.75-1jpp.1.el7 |
redhat/java | <1.7.1-ibm-plugin-1.7.1.4.75-1jpp.1.el7 | 1.7.1-ibm-plugin-1.7.1.4.75-1jpp.1.el7 |
redhat/java | <1.7.1-ibm-src-1.7.1.4.75-1jpp.1.el7 | 1.7.1-ibm-src-1.7.1.4.75-1jpp.1.el7 |
redhat/java | <1.7.1-ibm-1.7.1.4.75-1jpp.1.el7 | 1.7.1-ibm-1.7.1.4.75-1jpp.1.el7 |
redhat/java | <1.7.1-ibm-demo-1.7.1.4.75-1jpp.1.el7 | 1.7.1-ibm-demo-1.7.1.4.75-1jpp.1.el7 |
redhat/java | <1.7.1-ibm-devel-1.7.1.4.75-1jpp.1.el7 | 1.7.1-ibm-devel-1.7.1.4.75-1jpp.1.el7 |
redhat/java | <1.7.1-ibm-jdbc-1.7.1.4.75-1jpp.1.el7 | 1.7.1-ibm-jdbc-1.7.1.4.75-1jpp.1.el7 |
redhat/java | <1.7.1-ibm-src-1.7.1.4.75-1jpp.1.el7 | 1.7.1-ibm-src-1.7.1.4.75-1jpp.1.el7 |
redhat/java | <1.7.1-ibm-1.7.1.4.75-1jpp.1.el7 | 1.7.1-ibm-1.7.1.4.75-1jpp.1.el7 |
redhat/java | <1.7.1-ibm-demo-1.7.1.4.75-1jpp.1.el7 | 1.7.1-ibm-demo-1.7.1.4.75-1jpp.1.el7 |
redhat/java | <1.7.1-ibm-devel-1.7.1.4.75-1jpp.1.el7 | 1.7.1-ibm-devel-1.7.1.4.75-1jpp.1.el7 |
redhat/java | <1.7.1-ibm-jdbc-1.7.1.4.75-1jpp.1.el7 | 1.7.1-ibm-jdbc-1.7.1.4.75-1jpp.1.el7 |
redhat/java | <1.7.1-ibm-src-1.7.1.4.75-1jpp.1.el7 | 1.7.1-ibm-src-1.7.1.4.75-1jpp.1.el7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2020:5586 is classified as important due to the risk of credentials being sent over unencrypted connections.
To fix RHSA-2020:5586, update your IBM Java SE packages to version 7R1 SR4-FP75 or later.
Affected versions include IBM Java SE 7 prior to version 7R1 SR4-FP75.
RHSA-2020:5586 addresses the vulnerability of credentials being sent over unencrypted LDAP connections.
Yes, RHSA-2020:5586 is relevant for all users of IBM Java SE 7, especially those using JNDI.