SUSE alert SUSE-SU-2018:1690-1 (java-1_8_0-openjdk)
| From: | <sle-security-updates@lists.suse.com> | |
| To: | <sle-security-updates@lists.suse.com> | |
| Subject: | SUSE-SU-2018:1690-1: important: Security update for java-1_8_0-openjdk | |
| Date: | Thu, 14 Jun 2018 15:08:08 +0200 | |
| Message-ID: | <20180614130808.50DA8FD2E@maintenance.suse.de> |
SUSE Security Update: Security update for java-1_8_0-openjdk ______________________________________________________________________________ Announcement ID: SUSE-SU-2018:1690-1 Rating: important References: #1087066 #1090023 #1090024 #1090025 #1090026 #1090027 #1090028 #1090029 #1090030 #1090032 #1090033 Cross-References: CVE-2018-2790 CVE-2018-2794 CVE-2018-2795 CVE-2018-2796 CVE-2018-2797 CVE-2018-2798 CVE-2018-2799 CVE-2018-2800 CVE-2018-2814 CVE-2018-2815 Affected Products: SUSE OpenStack Cloud 7 SUSE Linux Enterprise Server for SAP 12-SP2 SUSE Linux Enterprise Server for SAP 12-SP1 SUSE Linux Enterprise Server 12-SP3 SUSE Linux Enterprise Server 12-SP2-LTSS SUSE Linux Enterprise Server 12-SP1-LTSS SUSE Linux Enterprise Desktop 12-SP3 SUSE Enterprise Storage 4 ______________________________________________________________________________ An update that solves 10 vulnerabilities and has one errata is now available. Description: This update for java-1_8_0-openjdk to version 8u171 fixes the following issues: These security issues were fixed: - S8180881: Better packaging of deserialization - S8182362: Update CipherOutputStream Usage - S8183032: Upgrade to LittleCMS 2.9 - S8189123: More consistent classloading - S8189969, CVE-2018-2790, bsc#1090023: Manifest better manifest entries - S8189977, CVE-2018-2795, bsc#1090025: Improve permission portability - S8189981, CVE-2018-2796, bsc#1090026: Improve queuing portability - S8189985, CVE-2018-2797, bsc#1090027: Improve tabular data portability - S8189989, CVE-2018-2798, bsc#1090028: Improve container portability - S8189993, CVE-2018-2799, bsc#1090029: Improve document portability - S8189997, CVE-2018-2794, bsc#1090024: Enhance keystore mechanisms - S8190478: Improved interface method selection - S8190877: Better handling of abstract classes - S8191696: Better mouse positioning - S8192025, CVE-2018-2814, bsc#1090032: Less referential references - S8192030: Better MTSchema support - S8192757, CVE-2018-2815, bsc#1090033: Improve stub classes implementation - S8193409: Improve AES supporting classes - S8193414: Improvements in MethodType lookups - S8193833, CVE-2018-2800, bsc#1090030: Better RMI connection support For other changes please consult the changelog. Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE OpenStack Cloud 7: zypper in -t patch SUSE-OpenStack-Cloud-7-2018-1134=1 - SUSE Linux Enterprise Server for SAP 12-SP2: zypper in -t patch SUSE-SLE-SAP-12-SP2-2018-1134=1 - SUSE Linux Enterprise Server for SAP 12-SP1: zypper in -t patch SUSE-SLE-SAP-12-SP1-2018-1134=1 - SUSE Linux Enterprise Server 12-SP3: zypper in -t patch SUSE-SLE-SERVER-12-SP3-2018-1134=1 - SUSE Linux Enterprise Server 12-SP2-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-SP2-2018-1134=1 - SUSE Linux Enterprise Server 12-SP1-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-SP1-2018-1134=1 - SUSE Linux Enterprise Desktop 12-SP3: zypper in -t patch SUSE-SLE-DESKTOP-12-SP3-2018-1134=1 - SUSE Enterprise Storage 4: zypper in -t patch SUSE-Storage-4-2018-1134=1 Package List: - SUSE OpenStack Cloud 7 (s390x x86_64): java-1_8_0-openjdk-1.8.0.171-27.19.1 java-1_8_0-openjdk-debuginfo-1.8.0.171-27.19.1 java-1_8_0-openjdk-debugsource-1.8.0.171-27.19.1 java-1_8_0-openjdk-demo-1.8.0.171-27.19.1 java-1_8_0-openjdk-demo-debuginfo-1.8.0.171-27.19.1 java-1_8_0-openjdk-devel-1.8.0.171-27.19.1 java-1_8_0-openjdk-devel-debuginfo-1.8.0.171-27.19.1 java-1_8_0-openjdk-headless-1.8.0.171-27.19.1 java-1_8_0-openjdk-headless-debuginfo-1.8.0.171-27.19.1 - SUSE Linux Enterprise Server for SAP 12-SP2 (ppc64le x86_64): java-1_8_0-openjdk-1.8.0.171-27.19.1 java-1_8_0-openjdk-debuginfo-1.8.0.171-27.19.1 java-1_8_0-openjdk-debugsource-1.8.0.171-27.19.1 java-1_8_0-openjdk-demo-1.8.0.171-27.19.1 java-1_8_0-openjdk-demo-debuginfo-1.8.0.171-27.19.1 java-1_8_0-openjdk-devel-1.8.0.171-27.19.1 java-1_8_0-openjdk-devel-debuginfo-1.8.0.171-27.19.1 java-1_8_0-openjdk-headless-1.8.0.171-27.19.1 java-1_8_0-openjdk-headless-debuginfo-1.8.0.171-27.19.1 - SUSE Linux Enterprise Server for SAP 12-SP1 (ppc64le x86_64): java-1_8_0-openjdk-1.8.0.171-27.19.1 java-1_8_0-openjdk-debuginfo-1.8.0.171-27.19.1 java-1_8_0-openjdk-debugsource-1.8.0.171-27.19.1 java-1_8_0-openjdk-demo-1.8.0.171-27.19.1 java-1_8_0-openjdk-demo-debuginfo-1.8.0.171-27.19.1 java-1_8_0-openjdk-devel-1.8.0.171-27.19.1 java-1_8_0-openjdk-headless-1.8.0.171-27.19.1 java-1_8_0-openjdk-headless-debuginfo-1.8.0.171-27.19.1 - SUSE Linux Enterprise Server 12-SP3 (aarch64 ppc64le s390x x86_64): java-1_8_0-openjdk-1.8.0.171-27.19.1 java-1_8_0-openjdk-debuginfo-1.8.0.171-27.19.1 java-1_8_0-openjdk-debugsource-1.8.0.171-27.19.1 java-1_8_0-openjdk-demo-1.8.0.171-27.19.1 java-1_8_0-openjdk-demo-debuginfo-1.8.0.171-27.19.1 java-1_8_0-openjdk-devel-1.8.0.171-27.19.1 java-1_8_0-openjdk-devel-debuginfo-1.8.0.171-27.19.1 java-1_8_0-openjdk-headless-1.8.0.171-27.19.1 java-1_8_0-openjdk-headless-debuginfo-1.8.0.171-27.19.1 - SUSE Linux Enterprise Server 12-SP2-LTSS (ppc64le s390x x86_64): java-1_8_0-openjdk-1.8.0.171-27.19.1 java-1_8_0-openjdk-debuginfo-1.8.0.171-27.19.1 java-1_8_0-openjdk-debugsource-1.8.0.171-27.19.1 java-1_8_0-openjdk-demo-1.8.0.171-27.19.1 java-1_8_0-openjdk-demo-debuginfo-1.8.0.171-27.19.1 java-1_8_0-openjdk-devel-1.8.0.171-27.19.1 java-1_8_0-openjdk-devel-debuginfo-1.8.0.171-27.19.1 java-1_8_0-openjdk-headless-1.8.0.171-27.19.1 java-1_8_0-openjdk-headless-debuginfo-1.8.0.171-27.19.1 - SUSE Linux Enterprise Server 12-SP1-LTSS (ppc64le s390x x86_64): java-1_8_0-openjdk-1.8.0.171-27.19.1 java-1_8_0-openjdk-debuginfo-1.8.0.171-27.19.1 java-1_8_0-openjdk-debugsource-1.8.0.171-27.19.1 java-1_8_0-openjdk-demo-1.8.0.171-27.19.1 java-1_8_0-openjdk-demo-debuginfo-1.8.0.171-27.19.1 java-1_8_0-openjdk-devel-1.8.0.171-27.19.1 java-1_8_0-openjdk-headless-1.8.0.171-27.19.1 java-1_8_0-openjdk-headless-debuginfo-1.8.0.171-27.19.1 - SUSE Linux Enterprise Desktop 12-SP3 (x86_64): java-1_8_0-openjdk-1.8.0.171-27.19.1 java-1_8_0-openjdk-debuginfo-1.8.0.171-27.19.1 java-1_8_0-openjdk-debugsource-1.8.0.171-27.19.1 java-1_8_0-openjdk-headless-1.8.0.171-27.19.1 java-1_8_0-openjdk-headless-debuginfo-1.8.0.171-27.19.1 - SUSE Enterprise Storage 4 (x86_64): java-1_8_0-openjdk-1.8.0.171-27.19.1 java-1_8_0-openjdk-debuginfo-1.8.0.171-27.19.1 java-1_8_0-openjdk-debugsource-1.8.0.171-27.19.1 java-1_8_0-openjdk-demo-1.8.0.171-27.19.1 java-1_8_0-openjdk-demo-debuginfo-1.8.0.171-27.19.1 java-1_8_0-openjdk-devel-1.8.0.171-27.19.1 java-1_8_0-openjdk-devel-debuginfo-1.8.0.171-27.19.1 java-1_8_0-openjdk-headless-1.8.0.171-27.19.1 java-1_8_0-openjdk-headless-debuginfo-1.8.0.171-27.19.1 References: https://www.suse.com/security/cve/CVE-2018-2790.html https://www.suse.com/security/cve/CVE-2018-2794.html https://www.suse.com/security/cve/CVE-2018-2795.html https://www.suse.com/security/cve/CVE-2018-2796.html https://www.suse.com/security/cve/CVE-2018-2797.html https://www.suse.com/security/cve/CVE-2018-2798.html https://www.suse.com/security/cve/CVE-2018-2799.html https://www.suse.com/security/cve/CVE-2018-2800.html https://www.suse.com/security/cve/CVE-2018-2814.html https://www.suse.com/security/cve/CVE-2018-2815.html https://bugzilla.suse.com/1087066 https://bugzilla.suse.com/1090023 https://bugzilla.suse.com/1090024 https://bugzilla.suse.com/1090025 https://bugzilla.suse.com/1090026 https://bugzilla.suse.com/1090027 https://bugzilla.suse.com/1090028 https://bugzilla.suse.com/1090029 https://bugzilla.suse.com/1090030 https://bugzilla.suse.com/1090032 https://bugzilla.suse.com/1090033 _______________________________________________ sle-security-updates mailing list sle-security-updates@lists.suse.com http://lists.suse.com/mailman/listinfo/sle-security-updates
