In case you are not aware of the options presented by OMSA, it is possible to specify system JRE rather than the bundled JRE which would allow the use of updated JRE release.
https://topics-cdn.dell.com/pdf/openmanage-server-administrator-v94_users-guide_en-us.pdf#page=31 Under Webserver Preferences you will find: The Java Runtime Environment — Allows you to select the one of the following options: • Bundled JRE — Enables use of the JRE provided along with the System Administrator. • System JRE — Enables use of the JRE installed on the system. Select the required version from the drop-down list Generally speaking, the bundled JRE is only updated alongside full OMSA releases which is one reason this option is provided. Josh Moore Sr. Principal Engineer, Compute & Solutions Support Team, HPC SME Dell EMC | Infrastructure Solutions Support [email protected] How am I doing? Please contact my manager [email protected] to provide feedback. Thanks! Please consider the environment before printing this email. Confidentiality Notice: This email message, including any attachments, is for the sole use of the intended recipient(s) and may contain confidential or proprietary information. Any unauthorized review, use, disclosure or distribution is prohibited. If you are not the intended recipient, immediately contact the sender by reply e-mail and destroy all copies of the original message. -----Original Message----- From: linux-poweredge-bounces-Lists <[email protected]> On Behalf Of White, Spike Sent: Monday, March 16, 2020 12:15 PM To: linux-poweredge-Lists Subject: Re: [Linux-PowerEdge] srvadmin-jre-9.4.0-3787.15943.el7.x86_64.rpm vulnerable Zbigniew, I am an OMSA consumer -- same as you. Because we do not routinely update the OMSA versions on our older server builds, our cybersecurity team identifies a lot of java vulnerabilities as well. To avoid this maintenance nightmare, our team now has a policy of doing the OMSA install minus the GUI (which also means minus java and minus tomcat). Now We have also retrofitted our old OMSA builds -- removed the GUI, java and tomcat. Occasionally, the cybersecurity team picked up tomcat vulnerabilities in the older OMSA installs, but it's far more frequent that they picked up java vulnerabilities. To install OMSA w/o the CLI isn't quite as easy as installing the full OMSA. To install the full OMSA, you merely do a: yum install srvadmin-all At least for OMSA 9.4, a colleague has gone through the list of RPMs and determined this was the min set to install OMSA functions, but without java/GUI: yum install dell-system-update srvadmin-base srvadmin-storageservices srvadmin-idrac srvadmin-server-snmp srvadmin-server-cli Spike White Dell IT ------------------------------ Message: 2 Date: Fri, 13 Mar 2020 10:18:31 +0100 From: "mr.zbiggy" <[email protected]> To: [email protected] Subject: [Linux-PowerEdge] [Security Alert] Latest Dell's srvadmin-jre-9.4.0-3787.15943.el7.x86_64.rpm vulnerable Message-ID: <[email protected]> Content-Type: text/plain; charset="utf-8" [EXTERNAL EMAIL] Dear Dell, Nessus Security Scanner found your package: srvadmin-jre-9.4.0-3787.15943.el7.x86_64.rpm vulnerable. Please update. Java JRE 1.11.0_4 from Dell's package: srvadmin-jre-9.4.0-3787.15943.el7.x86_64.rpm has several vulnerabilities. Please update to fixed Java JRE 1.11.0_6 or stop distributing Java JRE and start using Java from Operating System which is faster maintained. Package : srvadmin-jre-9.4.0-3787.15943.el7.x86_64.rpm Path : /opt/dell/srvadmin/lib64/openmanage/ Installed version : 1.11.0_4 Fixed version : 1.11.0_6 The version of Oracle (formerly Sun) Java SE or Java for Business installed on the remote host is prior to 11 Update 6. It is, therefore, affected by multiple vulnerabilities related to the following components: - 2D - Libraries - Kerberos - Networking - JavaFX - Hotspot - Scripting - Javadoc - Deployment - Concurrency - JAXP - Serialization - Security Nessus has not tested for these issues but has instead relied only on the application's self-reported version number. - Oracle Java SE and Java SE Embedded are prone to a severe division by zero, over 'Multiple' protocol. This issue affects the 'SQLite' component.(CVE-2019-16168) - Oracle Java SE and Java SE Embedded are prone to format string vulnerability, leading to a read uninitialized stack data over 'Multiple' protocol. This issue affects the 'libxst' component. (CVE-2019-13117, CVE-2019-13118) - Oracle Java SE and Java SE Embedded are prone to a remote security vulnerability. An unauthenticated remote attacker can exploit this over 'Kerberos' protocol. This issue affects the 'Security' component. (CVE-2020-2601, CVE-2020-2590) - Oracle Java SE/Java SE Embedded are prone to a remote security vulnerability. An unauthenticated remote attacker can exploit this overmultiple protocols. This issue affects the 'Serialization' component. (CVE-2020-2604, CVE-2020-2583) - Oracle Java SE/Java SE Embedded are prone to a remote security vulnerability. Tn unauthenticated remote attacker can exploit this over multiple protocols. This issue affects the 'Networking' component. (CVE-2020-2593, CVE-2020-2659) - Oracle Java SE are prone to a remote security vulnerability. An unauthenticated remote attacker can exploit this over multiple protocols. This issue affects the 'Libraries' component. (CVE-2020-2654) - Oracle Java SE are prone to a multiple security vulnerability. An unauthenticated remote attacker can exploit this over multiple protocols. This issue affects the 'JavaFX' component. (CVE-2020-2585) - Oracle Java SE are prone to a multiple security vulnerability. An unauthenticate remote attacker can exploit this over 'HTTPS' protocols. This issue affects the 'JSSE' component. (CVE-2020-2655) iava: 2019-A-0385 cve: CVE-2019-11068 cve: CVE-2019-2894 cve: CVE-2019-2933 cve: CVE-2019-2945 cve: CVE-2019-2949 cve: CVE-2019-2958 cve: CVE-2019-2962 cve: CVE-2019-2964 cve: CVE-2019-2973 cve: CVE-2019-2975 cve: CVE-2019-2977 cve: CVE-2019-2978 cve: CVE-2019-2981 cve: CVE-2019-2983 cve: CVE-2019-2987 cve: CVE-2019-2988 cve: CVE-2019-2989 cve: CVE-2019-2992 cve: CVE-2019-2996 cve: CVE-2019-2999 bid: 109323 iava: 2020-A-0023 cve: CVE-2019-13117 cve: CVE-2019-13118 cve: CVE-2019-16168 cve: CVE-2020-2583 cve: CVE-2020-2585 cve: CVE-2020-2590 cve: CVE-2020-2593 cve: CVE-2020-2601 cve: CVE-2020-2604 cve: CVE-2020-2654 cve: CVE-2020-2655 cve: CVE-2020-2659 greetings, Zbigniew _______________________________________________ Linux-PowerEdge mailing list [email protected] https://lists.us.dell.com/mailman/listinfo/linux-poweredge _______________________________________________ Linux-PowerEdge mailing list [email protected] https://lists.us.dell.com/mailman/listinfo/linux-poweredge
