openSUSE Security Update: Security update for java-1_7_0-openjdk
______________________________________________________________________________
Announcement ID: openSUSE-SU-2018:1710-1
Rating: important
References: #1090023 #1090024 #1090025 #1090026 #1090027
#1090028 #1090029 #1090030 #1090032 #1090033
Cross-References: CVE-2018-2790 CVE-2018-2794 CVE-2018-2795
CVE-2018-2796 CVE-2018-2797 CVE-2018-2798
CVE-2018-2799 CVE-2018-2800 CVE-2018-2814
CVE-2018-2815
Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________
An update that fixes 10 vulnerabilities is now available.
Description:
This update for java-1_7_0-openjdk to version 7u181 fixes the following
issues:
+ S8162488: JDK should be updated to use LittleCMS 2.8
+ S8180881: Better packaging of deserialization
+ S8182362: Update CipherOutputStream Usage
+ S8183032: Upgrade to LittleCMS 2.9
+ S8189123: More consistent classloading
+ S8190478: Improved interface method selection
+ S8190877: Better handling of abstract classes
+ S8191696: Better mouse positioning
+ S8192030: Better MTSchema support
+ S8193409: Improve AES supporting classes
+ S8193414: Improvements in MethodType lookups
+ S8189969, CVE-2018-2790, bsc#1090023: Manifest better manifest entries
+ S8189977, CVE-2018-2795, bsc#1090025: Improve permission portability
+ S8189981, CVE-2018-2796, bsc#1090026: Improve queuing portability
+ S8189985, CVE-2018-2797, bsc#1090027: Improve tabular data portability
+ S8189989, CVE-2018-2798, bsc#1090028: Improve container portability
+ S8189993, CVE-2018-2799, bsc#1090029: Improve document portability
+ S8189997, CVE-2018-2794, bsc#1090024: Enhance keystore mechanisms
+ S8192025, CVE-2018-2814, bsc#1090032: Less referential references
+ S8192757, CVE-2018-2815, bsc#1090033: Improve stub classes implementation
+ S8193833, CVE-2018-2800, bsc#1090030: Better RMI connection support
For additional changes please consult the changelog.
This update was imported from the SUSE:SLE-12:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:
– openSUSE Leap 42.3:
zypper in -t patch openSUSE-2018-637=1
Package List:
– openSUSE Leap 42.3 (i586 x86_64):
java-1_7_0-openjdk-1.7.0.181-51.1
java-1_7_0-openjdk-accessibility-1.7.0.181-51.1
java-1_7_0-openjdk-bootstrap-1.7.0.181-51.1
java-1_7_0-openjdk-bootstrap-debuginfo-1.7.0.181-51.1
java-1_7_0-openjdk-bootstrap-debugsource-1.7.0.181-51.1
java-1_7_0-openjdk-bootstrap-devel-1.7.0.181-51.1
java-1_7_0-openjdk-bootstrap-devel-debuginfo-1.7.0.181-51.1
java-1_7_0-openjdk-bootstrap-headless-1.7.0.181-51.1
java-1_7_0-openjdk-bootstrap-headless-debuginfo-1.7.0.181-51.1
java-1_7_0-openjdk-debuginfo-1.7.0.181-51.1
java-1_7_0-openjdk-debugsource-1.7.0.181-51.1
java-1_7_0-openjdk-demo-1.7.0.181-51.1
java-1_7_0-openjdk-demo-debuginfo-1.7.0.181-51.1
java-1_7_0-openjdk-devel-1.7.0.181-51.1
java-1_7_0-openjdk-devel-debuginfo-1.7.0.181-51.1
java-1_7_0-openjdk-headless-1.7.0.181-51.1
java-1_7_0-openjdk-headless-debuginfo-1.7.0.181-51.1
java-1_7_0-openjdk-src-1.7.0.181-51.1
– openSUSE Leap 42.3 (noarch):
java-1_7_0-openjdk-javadoc-1.7.0.181-51.1
References:
https://www.suse.com/security/cve/CVE-2018-2790.html
https://www.suse.com/security/cve/CVE-2018-2794.html
https://www.suse.com/security/cve/CVE-2018-2795.html
https://www.suse.com/security/cve/CVE-2018-2796.html
https://www.suse.com/security/cve/CVE-2018-2797.html
https://www.suse.com/security/cve/CVE-2018-2798.html
https://www.suse.com/security/cve/CVE-2018-2799.html
https://www.suse.com/security/cve/CVE-2018-2800.html
https://www.suse.com/security/cve/CVE-2018-2814.html
https://www.suse.com/security/cve/CVE-2018-2815.html
https://bugzilla.suse.com/1090023
https://bugzilla.suse.com/1090024
https://bugzilla.suse.com/1090025
https://bugzilla.suse.com/1090026
https://bugzilla.suse.com/1090027
https://bugzilla.suse.com/1090028
https://bugzilla.suse.com/1090029
https://bugzilla.suse.com/1090030
https://bugzilla.suse.com/1090032
https://bugzilla.suse.com/1090033
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
openSUSE Security Update: Security update for java-1_8_0-openjdk
______________________________________________________________________________
Announcement ID: openSUSE-SU-2018:1719-1
Rating: important
References: #1087066 #1090023 #1090024 #1090025 #1090026
#1090027 #1090028 #1090029 #1090030 #1090032
#1090033
Cross-References: CVE-2018-2790 CVE-2018-2794 CVE-2018-2795
CVE-2018-2796 CVE-2018-2797 CVE-2018-2798
CVE-2018-2799 CVE-2018-2800 CVE-2018-2814
CVE-2018-2815
Affected Products:
openSUSE Leap 42.3
openSUSE Leap 15.0
______________________________________________________________________________
An update that solves 10 vulnerabilities and has one errata
is now available.
Description:
This update for java-1_8_0-openjdk to version 8u171 fixes the following
issues:
These security issues were fixed:
– S8180881: Better packaging of deserialization
– S8182362: Update CipherOutputStream Usage
– S8183032: Upgrade to LittleCMS 2.9
– S8189123: More consistent classloading
– S8189969, CVE-2018-2790, bsc#1090023: Manifest better manifest entries
– S8189977, CVE-2018-2795, bsc#1090025: Improve permission portability
– S8189981, CVE-2018-2796, bsc#1090026: Improve queuing portability
– S8189985, CVE-2018-2797, bsc#1090027: Improve tabular data portability
– S8189989, CVE-2018-2798, bsc#1090028: Improve container portability
– S8189993, CVE-2018-2799, bsc#1090029: Improve document portability
– S8189997, CVE-2018-2794, bsc#1090024: Enhance keystore mechanisms
– S8190478: Improved interface method selection
– S8190877: Better handling of abstract classes
– S8191696: Better mouse positioning
– S8192025, CVE-2018-2814, bsc#1090032: Less referential references
– S8192030: Better MTSchema support
– S8192757, CVE-2018-2815, bsc#1090033: Improve stub classes implementation
– S8193409: Improve AES supporting classes
– S8193414: Improvements in MethodType lookups
– S8193833, CVE-2018-2800, bsc#1090030: Better RMI connection support
For other changes please consult the changelog.
This update was imported from the SUSE:SLE-12-SP1:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:
– openSUSE Leap 42.3:
zypper in -t patch openSUSE-2018-641=1
– openSUSE Leap 15.0:
zypper in -t patch openSUSE-2018-641=1
Package List:
– openSUSE Leap 42.3 (i586 x86_64):
java-1_8_0-openjdk-1.8.0.171-24.1
java-1_8_0-openjdk-accessibility-1.8.0.171-24.1
java-1_8_0-openjdk-debuginfo-1.8.0.171-24.1
java-1_8_0-openjdk-debugsource-1.8.0.171-24.1
java-1_8_0-openjdk-demo-1.8.0.171-24.1
java-1_8_0-openjdk-demo-debuginfo-1.8.0.171-24.1
java-1_8_0-openjdk-devel-1.8.0.171-24.1
java-1_8_0-openjdk-devel-debuginfo-1.8.0.171-24.1
java-1_8_0-openjdk-headless-1.8.0.171-24.1
java-1_8_0-openjdk-headless-debuginfo-1.8.0.171-24.1
java-1_8_0-openjdk-src-1.8.0.171-24.1
– openSUSE Leap 42.3 (noarch):
java-1_8_0-openjdk-javadoc-1.8.0.171-24.1
– openSUSE Leap 15.0 (i586 x86_64):
java-1_8_0-openjdk-1.8.0.171-lp150.2.3.1
java-1_8_0-openjdk-accessibility-1.8.0.171-lp150.2.3.1
java-1_8_0-openjdk-debuginfo-1.8.0.171-lp150.2.3.1
java-1_8_0-openjdk-debugsource-1.8.0.171-lp150.2.3.1
java-1_8_0-openjdk-demo-1.8.0.171-lp150.2.3.1
java-1_8_0-openjdk-demo-debuginfo-1.8.0.171-lp150.2.3.1
java-1_8_0-openjdk-devel-1.8.0.171-lp150.2.3.1
java-1_8_0-openjdk-devel-debuginfo-1.8.0.171-lp150.2.3.1
java-1_8_0-openjdk-headless-1.8.0.171-lp150.2.3.1
java-1_8_0-openjdk-headless-debuginfo-1.8.0.171-lp150.2.3.1
java-1_8_0-openjdk-src-1.8.0.171-lp150.2.3.1
– openSUSE Leap 15.0 (noarch):
java-1_8_0-openjdk-javadoc-1.8.0.171-lp150.2.3.1
References:
https://www.suse.com/security/cve/CVE-2018-2790.html
https://www.suse.com/security/cve/CVE-2018-2794.html
https://www.suse.com/security/cve/CVE-2018-2795.html
https://www.suse.com/security/cve/CVE-2018-2796.html
https://www.suse.com/security/cve/CVE-2018-2797.html
https://www.suse.com/security/cve/CVE-2018-2798.html
https://www.suse.com/security/cve/CVE-2018-2799.html
https://www.suse.com/security/cve/CVE-2018-2800.html
https://www.suse.com/security/cve/CVE-2018-2814.html
https://www.suse.com/security/cve/CVE-2018-2815.html
https://bugzilla.suse.com/1087066
https://bugzilla.suse.com/1090023
https://bugzilla.suse.com/1090024
https://bugzilla.suse.com/1090025
https://bugzilla.suse.com/1090026
https://bugzilla.suse.com/1090027
https://bugzilla.suse.com/1090028
https://bugzilla.suse.com/1090029
https://bugzilla.suse.com/1090030
https://bugzilla.suse.com/1090032
https://bugzilla.suse.com/1090033
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org