SUSE SLES12 Security Update : java-1_7_0-openjdk (SUSE-SU-2018:1692-2)

high Nessus Plugin ID 118264

Language:

New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The remote SUSE host is missing one or more security updates.

Description

This update for java-1_7_0-openjdk to version 7u181 fixes the following issues :

S8162488: JDK should be updated to use LittleCMS 2.8

S8180881: Better packaging of deserialization

S8182362: Update CipherOutputStream Usage

S8183032: Upgrade to LittleCMS 2.9

S8189123: More consistent classloading

S8190478: Improved interface method selection

S8190877: Better handling of abstract classes

S8191696: Better mouse positioning

S8192030: Better MTSchema support

S8193409: Improve AES supporting classes

S8193414: Improvements in MethodType lookups

S8189969, CVE-2018-2790, bsc#1090023: Manifest better manifest entries

S8189977, CVE-2018-2795, bsc#1090025: Improve permission portability

S8189981, CVE-2018-2796, bsc#1090026: Improve queuing portability

S8189985, CVE-2018-2797, bsc#1090027: Improve tabular data portability

S8189989, CVE-2018-2798, bsc#1090028: Improve container portability

S8189993, CVE-2018-2799, bsc#1090029: Improve document portability

S8189997, CVE-2018-2794, bsc#1090024: Enhance keystore mechanisms

S8192025, CVE-2018-2814, bsc#1090032: Less referential references

S8192757, CVE-2018-2815, bsc#1090033: Improve stub classes implementation

S8193833, CVE-2018-2800, bsc#1090030: Better RMI connection support

For additional changes please consult the changelog.

Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.

Solution

To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or 'zypper patch'.

Alternatively you can run the command listed for your product :

SUSE Linux Enterprise Server 12-SP2-BCL:zypper in -t patch SUSE-SLE-SERVER-12-SP2-BCL-2018-1135=1

See Also

https://bugzilla.suse.com/show_bug.cgi?id=1090023

https://bugzilla.suse.com/show_bug.cgi?id=1090024

https://bugzilla.suse.com/show_bug.cgi?id=1090025

https://bugzilla.suse.com/show_bug.cgi?id=1090026

https://bugzilla.suse.com/show_bug.cgi?id=1090027

https://bugzilla.suse.com/show_bug.cgi?id=1090028

https://bugzilla.suse.com/show_bug.cgi?id=1090029

https://bugzilla.suse.com/show_bug.cgi?id=1090030

https://bugzilla.suse.com/show_bug.cgi?id=1090032

https://bugzilla.suse.com/show_bug.cgi?id=1090033

https://www.suse.com/security/cve/CVE-2018-2790/

https://www.suse.com/security/cve/CVE-2018-2794/

https://www.suse.com/security/cve/CVE-2018-2795/

https://www.suse.com/security/cve/CVE-2018-2796/

https://www.suse.com/security/cve/CVE-2018-2797/

https://www.suse.com/security/cve/CVE-2018-2798/

https://www.suse.com/security/cve/CVE-2018-2799/

https://www.suse.com/security/cve/CVE-2018-2800/

https://www.suse.com/security/cve/CVE-2018-2814/

https://www.suse.com/security/cve/CVE-2018-2815/

http://www.nessus.org/u?807260c8

Plugin Details

Severity: High

ID: 118264

File Name: suse_SU-2018-1692-2.nasl

Version: 1.3

Type: local

Agent: unix

Published: 10/22/2018

Updated: 9/10/2019

Dependencies: ssh_get_info.nasl

Risk Information

VPR

Risk Factor: Medium

Score: 6.5

CVSS v2

Risk Factor: Medium

Base Score: 5.1

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: High

Base Score: 8.3

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H

Vulnerability Information

CPE: cpe:2.3:o:novell:suse_linux:12:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:suse_linux:java-1_7_0-openjdk:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:suse_linux:java-1_7_0-openjdk-debuginfo:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:suse_linux:java-1_7_0-openjdk-debugsource:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:suse_linux:java-1_7_0-openjdk-demo:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:suse_linux:java-1_7_0-openjdk-demo-debuginfo:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:suse_linux:java-1_7_0-openjdk-devel:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:suse_linux:java-1_7_0-openjdk-devel-debuginfo:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:suse_linux:java-1_7_0-openjdk-headless:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:suse_linux:java-1_7_0-openjdk-headless-debuginfo:*:*:*:*:*:*:*

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Patch Publication Date: 10/18/2018

Vulnerability Publication Date: 4/19/2018

Reference Information

CVE: CVE-2018-2790, CVE-2018-2794, CVE-2018-2795, CVE-2018-2796, CVE-2018-2797, CVE-2018-2798, CVE-2018-2799, CVE-2018-2800, CVE-2018-2814, CVE-2018-2815