Login
Login-Name Passwort


 
Newsletter
Werbung

Sicherheit: Mehrere Probleme in OpenJDK
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in OpenJDK
ID: SUSE-SU-2017:2989-1
Distribution: SUSE
Plattformen: SUSE Linux Enterprise Server for SAP 12-SP1, SUSE OpenStack Cloud 6, SUSE Linux Enterprise Desktop 12-SP2, SUSE Linux Enterprise Server 12-SP2, SUSE Linux Enterprise Server for Raspberry Pi 12-SP2, SUSE Linux Enterprise Server 12-SP1-LTSS, SUSE Linux Enterprise Desktop 12-SP3, SUSE Linux Enterprise Server 12-SP3
Datum: Fr, 10. November 2017, 18:33
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10346
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10355
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10348
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9842
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10347
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10285
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10274
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10356
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9843
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10281
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10295
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10349
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10357
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9840
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10165
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10345
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9841
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10388
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10350

Originalnachricht

   SUSE Security Update: Security update for java-1_8_0-openjdk
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2989-1
Rating: important
References: #1032647 #1052009 #1064069 #1064070 #1064071
#1064072 #1064073 #1064075 #1064077 #1064078
#1064079 #1064080 #1064081 #1064082 #1064083
#1064084 #1064085 #1064086
Cross-References: CVE-2016-10165 CVE-2016-9840 CVE-2016-9841
CVE-2016-9842 CVE-2016-9843 CVE-2017-10274
CVE-2017-10281 CVE-2017-10285 CVE-2017-10295
CVE-2017-10345 CVE-2017-10346 CVE-2017-10347
CVE-2017-10348 CVE-2017-10349 CVE-2017-10350
CVE-2017-10355 CVE-2017-10356 CVE-2017-10357
CVE-2017-10388
Affected Products:
SUSE OpenStack Cloud 6
SUSE Linux Enterprise Server for SAP 12-SP1
SUSE Linux Enterprise Server for Raspberry Pi 12-SP2
SUSE Linux Enterprise Server 12-SP3
SUSE Linux Enterprise Server 12-SP2
SUSE Linux Enterprise Server 12-SP1-LTSS
SUSE Linux Enterprise Desktop 12-SP3
SUSE Linux Enterprise Desktop 12-SP2
______________________________________________________________________________

An update that fixes 19 vulnerabilities is now available.

Description:

This update for java-1_8_0-openjdk fixes the following issues:

- Update to version jdk8u151 (icedtea 3.6.0)

Security issues fixed:

- CVE-2017-10274: Handle smartcard clean up better (bsc#1064071)
- CVE-2017-10281: Better queuing priorities (bsc#1064072)
- CVE-2017-10285: Unreferenced references (bsc#1064073)
- CVE-2017-10295: Better URL connections (bsc#1064075)
- CVE-2017-10388: Correct Kerberos ticket grants (bsc#1064086)
- CVE-2017-10346: Better invokespecial checks (bsc#1064078)
- CVE-2017-10350: Better Base Exceptions (bsc#1064082)
- CVE-2017-10347: Better timezone processing (bsc#1064079)
- CVE-2017-10349: Better X processing (bsc#1064081)
- CVE-2017-10345: Better keystore handling (bsc#1064077)
- CVE-2017-10348: Better processing of unresolved permissions (bsc#1064080)
- CVE-2017-10357: Process Proxy presentation (bsc#1064085)
- CVE-2017-10355: More stable connection processing (bsc#1064083)
- CVE-2017-10356: Update storage implementations (bsc#1064084)
- CVE-2016-10165: Improve CMS header processing (bsc#1064069)
- CVE-2016-9840, CVE-2016-9841, CVE-2016-9842, CVE-2016-9843: Upgrade
compression library (bsc#1064070)

Bug fixes:

- Fix bsc#1032647, bsc#1052009 with btrfs subvolumes and overlayfs


Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- SUSE OpenStack Cloud 6:

zypper in -t patch SUSE-OpenStack-Cloud-6-2017-1847=1

- SUSE Linux Enterprise Server for SAP 12-SP1:

zypper in -t patch SUSE-SLE-SAP-12-SP1-2017-1847=1

- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2:

zypper in -t patch SUSE-SLE-RPI-12-SP2-2017-1847=1

- SUSE Linux Enterprise Server 12-SP3:

zypper in -t patch SUSE-SLE-SERVER-12-SP3-2017-1847=1

- SUSE Linux Enterprise Server 12-SP2:

zypper in -t patch SUSE-SLE-SERVER-12-SP2-2017-1847=1

- SUSE Linux Enterprise Server 12-SP1-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-1847=1

- SUSE Linux Enterprise Desktop 12-SP3:

zypper in -t patch SUSE-SLE-DESKTOP-12-SP3-2017-1847=1

- SUSE Linux Enterprise Desktop 12-SP2:

zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2017-1847=1

To bring your system up-to-date, use "zypper patch".


Package List:

- SUSE OpenStack Cloud 6 (x86_64):

java-1_8_0-openjdk-1.8.0.151-27.8.1
java-1_8_0-openjdk-debuginfo-1.8.0.151-27.8.1
java-1_8_0-openjdk-debugsource-1.8.0.151-27.8.1
java-1_8_0-openjdk-demo-1.8.0.151-27.8.1
java-1_8_0-openjdk-demo-debuginfo-1.8.0.151-27.8.1
java-1_8_0-openjdk-devel-1.8.0.151-27.8.1
java-1_8_0-openjdk-headless-1.8.0.151-27.8.1
java-1_8_0-openjdk-headless-debuginfo-1.8.0.151-27.8.1

- SUSE Linux Enterprise Server for SAP 12-SP1 (ppc64le x86_64):

java-1_8_0-openjdk-1.8.0.151-27.8.1
java-1_8_0-openjdk-debuginfo-1.8.0.151-27.8.1
java-1_8_0-openjdk-debugsource-1.8.0.151-27.8.1
java-1_8_0-openjdk-demo-1.8.0.151-27.8.1
java-1_8_0-openjdk-demo-debuginfo-1.8.0.151-27.8.1
java-1_8_0-openjdk-devel-1.8.0.151-27.8.1
java-1_8_0-openjdk-headless-1.8.0.151-27.8.1
java-1_8_0-openjdk-headless-debuginfo-1.8.0.151-27.8.1

- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64):

java-1_8_0-openjdk-1.8.0.151-27.8.1
java-1_8_0-openjdk-debuginfo-1.8.0.151-27.8.1
java-1_8_0-openjdk-debugsource-1.8.0.151-27.8.1
java-1_8_0-openjdk-demo-1.8.0.151-27.8.1
java-1_8_0-openjdk-demo-debuginfo-1.8.0.151-27.8.1
java-1_8_0-openjdk-devel-1.8.0.151-27.8.1
java-1_8_0-openjdk-devel-debuginfo-1.8.0.151-27.8.1
java-1_8_0-openjdk-headless-1.8.0.151-27.8.1
java-1_8_0-openjdk-headless-debuginfo-1.8.0.151-27.8.1

- SUSE Linux Enterprise Server 12-SP3 (aarch64 ppc64le s390x x86_64):

java-1_8_0-openjdk-1.8.0.151-27.8.1
java-1_8_0-openjdk-debuginfo-1.8.0.151-27.8.1
java-1_8_0-openjdk-debugsource-1.8.0.151-27.8.1
java-1_8_0-openjdk-demo-1.8.0.151-27.8.1
java-1_8_0-openjdk-demo-debuginfo-1.8.0.151-27.8.1
java-1_8_0-openjdk-devel-1.8.0.151-27.8.1
java-1_8_0-openjdk-devel-debuginfo-1.8.0.151-27.8.1
java-1_8_0-openjdk-headless-1.8.0.151-27.8.1
java-1_8_0-openjdk-headless-debuginfo-1.8.0.151-27.8.1

- SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le s390x x86_64):

java-1_8_0-openjdk-1.8.0.151-27.8.1
java-1_8_0-openjdk-debuginfo-1.8.0.151-27.8.1
java-1_8_0-openjdk-debugsource-1.8.0.151-27.8.1
java-1_8_0-openjdk-demo-1.8.0.151-27.8.1
java-1_8_0-openjdk-demo-debuginfo-1.8.0.151-27.8.1
java-1_8_0-openjdk-devel-1.8.0.151-27.8.1
java-1_8_0-openjdk-devel-debuginfo-1.8.0.151-27.8.1
java-1_8_0-openjdk-headless-1.8.0.151-27.8.1
java-1_8_0-openjdk-headless-debuginfo-1.8.0.151-27.8.1

- SUSE Linux Enterprise Server 12-SP1-LTSS (ppc64le s390x x86_64):

java-1_8_0-openjdk-1.8.0.151-27.8.1
java-1_8_0-openjdk-debuginfo-1.8.0.151-27.8.1
java-1_8_0-openjdk-debugsource-1.8.0.151-27.8.1
java-1_8_0-openjdk-demo-1.8.0.151-27.8.1
java-1_8_0-openjdk-demo-debuginfo-1.8.0.151-27.8.1
java-1_8_0-openjdk-devel-1.8.0.151-27.8.1
java-1_8_0-openjdk-headless-1.8.0.151-27.8.1
java-1_8_0-openjdk-headless-debuginfo-1.8.0.151-27.8.1

- SUSE Linux Enterprise Desktop 12-SP3 (x86_64):

java-1_8_0-openjdk-1.8.0.151-27.8.1
java-1_8_0-openjdk-debuginfo-1.8.0.151-27.8.1
java-1_8_0-openjdk-debugsource-1.8.0.151-27.8.1
java-1_8_0-openjdk-headless-1.8.0.151-27.8.1
java-1_8_0-openjdk-headless-debuginfo-1.8.0.151-27.8.1

- SUSE Linux Enterprise Desktop 12-SP2 (x86_64):

java-1_8_0-openjdk-1.8.0.151-27.8.1
java-1_8_0-openjdk-debuginfo-1.8.0.151-27.8.1
java-1_8_0-openjdk-debugsource-1.8.0.151-27.8.1
java-1_8_0-openjdk-headless-1.8.0.151-27.8.1
java-1_8_0-openjdk-headless-debuginfo-1.8.0.151-27.8.1


References:

https://www.suse.com/security/cve/CVE-2016-10165.html
https://www.suse.com/security/cve/CVE-2016-9840.html
https://www.suse.com/security/cve/CVE-2016-9841.html
https://www.suse.com/security/cve/CVE-2016-9842.html
https://www.suse.com/security/cve/CVE-2016-9843.html
https://www.suse.com/security/cve/CVE-2017-10274.html
https://www.suse.com/security/cve/CVE-2017-10281.html
https://www.suse.com/security/cve/CVE-2017-10285.html
https://www.suse.com/security/cve/CVE-2017-10295.html
https://www.suse.com/security/cve/CVE-2017-10345.html
https://www.suse.com/security/cve/CVE-2017-10346.html
https://www.suse.com/security/cve/CVE-2017-10347.html
https://www.suse.com/security/cve/CVE-2017-10348.html
https://www.suse.com/security/cve/CVE-2017-10349.html
https://www.suse.com/security/cve/CVE-2017-10350.html
https://www.suse.com/security/cve/CVE-2017-10355.html
https://www.suse.com/security/cve/CVE-2017-10356.html
https://www.suse.com/security/cve/CVE-2017-10357.html
https://www.suse.com/security/cve/CVE-2017-10388.html
https://bugzilla.suse.com/1032647
https://bugzilla.suse.com/1052009
https://bugzilla.suse.com/1064069
https://bugzilla.suse.com/1064070
https://bugzilla.suse.com/1064071
https://bugzilla.suse.com/1064072
https://bugzilla.suse.com/1064073
https://bugzilla.suse.com/1064075
https://bugzilla.suse.com/1064077
https://bugzilla.suse.com/1064078
https://bugzilla.suse.com/1064079
https://bugzilla.suse.com/1064080
https://bugzilla.suse.com/1064081
https://bugzilla.suse.com/1064082
https://bugzilla.suse.com/1064083
https://bugzilla.suse.com/1064084
https://bugzilla.suse.com/1064085
https://bugzilla.suse.com/1064086

--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
Pro-Linux
Pro-Linux @Twitter
Neue Nachrichten
Werbung