SUSE SLES12 Security Update : java-1_7_0-openjdk (SUSE-SU-2018:1692-2)

Medium Nessus Plugin ID 118264

Synopsis

The remote SUSE host is missing one or more security updates.

Description

This update for java-1_7_0-openjdk to version 7u181 fixes the following issues :

S8162488: JDK should be updated to use LittleCMS 2.8

S8180881: Better packaging of deserialization

S8182362: Update CipherOutputStream Usage

S8183032: Upgrade to LittleCMS 2.9

S8189123: More consistent classloading

S8190478: Improved interface method selection

S8190877: Better handling of abstract classes

S8191696: Better mouse positioning

S8192030: Better MTSchema support

S8193409: Improve AES supporting classes

S8193414: Improvements in MethodType lookups

S8189969, CVE-2018-2790, bsc#1090023: Manifest better manifest entries

S8189977, CVE-2018-2795, bsc#1090025: Improve permission portability

S8189981, CVE-2018-2796, bsc#1090026: Improve queuing portability

S8189985, CVE-2018-2797, bsc#1090027: Improve tabular data portability

S8189989, CVE-2018-2798, bsc#1090028: Improve container portability

S8189993, CVE-2018-2799, bsc#1090029: Improve document portability

S8189997, CVE-2018-2794, bsc#1090024: Enhance keystore mechanisms

S8192025, CVE-2018-2814, bsc#1090032: Less referential references

S8192757, CVE-2018-2815, bsc#1090033: Improve stub classes implementation

S8193833, CVE-2018-2800, bsc#1090030: Better RMI connection support

For additional changes please consult the changelog.

Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.

Solution

To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or 'zypper patch'.

Alternatively you can run the command listed for your product :

SUSE Linux Enterprise Server 12-SP2-BCL:zypper in -t patch SUSE-SLE-SERVER-12-SP2-BCL-2018-1135=1

See Also

https://bugzilla.suse.com/show_bug.cgi?id=1090023

https://bugzilla.suse.com/show_bug.cgi?id=1090024

https://bugzilla.suse.com/show_bug.cgi?id=1090025

https://bugzilla.suse.com/show_bug.cgi?id=1090026

https://bugzilla.suse.com/show_bug.cgi?id=1090027

https://bugzilla.suse.com/show_bug.cgi?id=1090028

https://bugzilla.suse.com/show_bug.cgi?id=1090029

https://bugzilla.suse.com/show_bug.cgi?id=1090030

https://bugzilla.suse.com/show_bug.cgi?id=1090032

https://bugzilla.suse.com/show_bug.cgi?id=1090033

https://www.suse.com/security/cve/CVE-2018-2790/

https://www.suse.com/security/cve/CVE-2018-2794/

https://www.suse.com/security/cve/CVE-2018-2795/

https://www.suse.com/security/cve/CVE-2018-2796/

https://www.suse.com/security/cve/CVE-2018-2797/

https://www.suse.com/security/cve/CVE-2018-2798/

https://www.suse.com/security/cve/CVE-2018-2799/

https://www.suse.com/security/cve/CVE-2018-2800/

https://www.suse.com/security/cve/CVE-2018-2814/

https://www.suse.com/security/cve/CVE-2018-2815/

http://www.nessus.org/u?807260c8

Plugin Details

Severity: Medium

ID: 118264

File Name: suse_SU-2018-1692-2.nasl

Version: 1.2

Type: local

Agent: unix

Published: 2018/10/22

Updated: 2018/12/01

Dependencies: 12634

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 5.1

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P

CVSS v3.0

Base Score: 8.3

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:java-1_7_0-openjdk, p-cpe:/a:novell:suse_linux:java-1_7_0-openjdk-debuginfo, p-cpe:/a:novell:suse_linux:java-1_7_0-openjdk-debugsource, p-cpe:/a:novell:suse_linux:java-1_7_0-openjdk-demo, p-cpe:/a:novell:suse_linux:java-1_7_0-openjdk-demo-debuginfo, p-cpe:/a:novell:suse_linux:java-1_7_0-openjdk-devel, p-cpe:/a:novell:suse_linux:java-1_7_0-openjdk-devel-debuginfo, p-cpe:/a:novell:suse_linux:java-1_7_0-openjdk-headless, p-cpe:/a:novell:suse_linux:java-1_7_0-openjdk-headless-debuginfo, cpe:/o:novell:suse_linux:12

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Patch Publication Date: 2018/10/18

Reference Information

CVE: CVE-2018-2790, CVE-2018-2794, CVE-2018-2795, CVE-2018-2796, CVE-2018-2797, CVE-2018-2798, CVE-2018-2799, CVE-2018-2800, CVE-2018-2814, CVE-2018-2815