Security update for java-1_7_0-openjdk
Announcement ID: | SUSE-SU-2019:0049-2 |
---|---|
Rating: | important |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves 13 vulnerabilities can now be installed.
Description:
This update for java-1_7_0-openjdk to version 7u201 fixes the following issues:
Security issues fixed:
- CVE-2018-3136: Manifest better support (bsc#1112142)
- CVE-2018-3139: Better HTTP Redirection (bsc#1112143)
- CVE-2018-3149: Enhance JNDI lookups (bsc#1112144)
- CVE-2018-3169: Improve field accesses (bsc#1112146)
- CVE-2018-3180: Improve TLS connections stability (bsc#1112147)
- CVE-2018-3214: Better RIFF reading support (bsc#1112152)
- CVE-2018-13785: Upgrade JDK 8u to libpng 1.6.35 (bsc#1112153)
- CVE-2018-16435: heap-based buffer overflow in SetData function in cmsIT8LoadFromFile
- CVE-2018-2938: Support Derby connections (bsc#1101644)
- CVE-2018-2940: Better stack walking (bsc#1101645)
- CVE-2018-2952: Exception to Pattern Syntax (bsc#1101651)
- CVE-2018-2973: Improve LDAP support (bsc#1101656)
- CVE-2018-3639 cpu speculative store bypass mitigation
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Server for SAP Applications 12 SP1
zypper in -t patch SUSE-SLE-SAP-12-SP1-2019-49=1
Package List:
-
SUSE Linux Enterprise Server for SAP Applications 12 SP1 (x86_64)
- java-1_7_0-openjdk-debugsource-1.7.0.201-43.18.1
- java-1_7_0-openjdk-headless-debuginfo-1.7.0.201-43.18.1
- java-1_7_0-openjdk-headless-1.7.0.201-43.18.1
- java-1_7_0-openjdk-devel-1.7.0.201-43.18.1
- java-1_7_0-openjdk-demo-debuginfo-1.7.0.201-43.18.1
- java-1_7_0-openjdk-1.7.0.201-43.18.1
- java-1_7_0-openjdk-devel-debuginfo-1.7.0.201-43.18.1
- java-1_7_0-openjdk-demo-1.7.0.201-43.18.1
- java-1_7_0-openjdk-debuginfo-1.7.0.201-43.18.1
References:
- https://www.suse.com/security/cve/CVE-2018-13785.html
- https://www.suse.com/security/cve/CVE-2018-16435.html
- https://www.suse.com/security/cve/CVE-2018-2938.html
- https://www.suse.com/security/cve/CVE-2018-2940.html
- https://www.suse.com/security/cve/CVE-2018-2952.html
- https://www.suse.com/security/cve/CVE-2018-2973.html
- https://www.suse.com/security/cve/CVE-2018-3136.html
- https://www.suse.com/security/cve/CVE-2018-3139.html
- https://www.suse.com/security/cve/CVE-2018-3149.html
- https://www.suse.com/security/cve/CVE-2018-3169.html
- https://www.suse.com/security/cve/CVE-2018-3180.html
- https://www.suse.com/security/cve/CVE-2018-3214.html
- https://www.suse.com/security/cve/CVE-2018-3639.html
- https://bugzilla.suse.com/show_bug.cgi?id=1101644
- https://bugzilla.suse.com/show_bug.cgi?id=1101645
- https://bugzilla.suse.com/show_bug.cgi?id=1101651
- https://bugzilla.suse.com/show_bug.cgi?id=1101656
- https://bugzilla.suse.com/show_bug.cgi?id=1112142
- https://bugzilla.suse.com/show_bug.cgi?id=1112143
- https://bugzilla.suse.com/show_bug.cgi?id=1112144
- https://bugzilla.suse.com/show_bug.cgi?id=1112146
- https://bugzilla.suse.com/show_bug.cgi?id=1112147
- https://bugzilla.suse.com/show_bug.cgi?id=1112152
- https://bugzilla.suse.com/show_bug.cgi?id=1112153