English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 150599 CVE descriptions
and 73533 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.851996
Category:SuSE Local Security Checks
Title:SuSE Update for java-11-openjdk openSUSE-SU-2018:3235-1 (java-11-openjdk)
Summary:The remote host is missing an update for the 'java-11-openjdk'; package(s) announced via the openSUSE-SU-2018:3235_1 advisory.
Description:Summary:
The remote host is missing an update for the 'java-11-openjdk'
package(s) announced via the openSUSE-SU-2018:3235_1 advisory.

Vulnerability Insight:
This update for java-11-openjdk fixes the following issues:

Update to upstream tag jdk-11.0.1+13 (Oracle October 2018 CPU)

Security fixes:

- S8202936, CVE-2018-3183, bsc#1112148: Improve script engine support

- S8199226, CVE-2018-3169, bsc#1112146: Improve field accesses

- S8199177, CVE-2018-3149, bsc#1112144: Enhance JNDI lookups

- S8202613, CVE-2018-3180, bsc#1112147: Improve TLS connections stability

- S8208209, CVE-2018-3180, bsc#1112147: Improve TLS connection stability
again

- S8199172, CVE-2018-3150, bsc#1112145: Improve jar attribute checks

- S8200648, CVE-2018-3157, bsc#1112149: Make midi code more sound

- S8194534, CVE-2018-3136, bsc#1112142: Manifest better support

- S8208754, CVE-2018-3136, bsc#1112142: The fix for JDK-8194534 needs
updates

- S8196902, CVE-2018-3139, bsc#1112143: Better HTTP Redirection

Security-In-Depth fixes:

- S8194546: Choosier FileManagers

- S8195874: Improve jar specification adherence

- S8196897: Improve PRNG support

- S8197881: Better StringBuilder support

- S8201756: Improve cipher inputs

- S8203654: Improve cypher state updates

- S8204497: Better formatting of decimals

- S8200666: Improve LDAP support

- S8199110: Address Internet Addresses

Update to upstream tag jdk-11+28 (OpenJDK 11 rc1)

- S8207317: SSLEngine negotiation fail exception behavior changed from
fail-fast to fail-lazy

- S8207838: AArch64: Float registers incorrectly restored in JNI call

- S8209637: [s390x] Interpreter doesn't call result handler after native
calls

- S8209670: CompilerThread releasing code buffer in destructor is unsafe

- S8209735: Disable avx512 by default

- S8209806: API docs should be updated to refer to javase11

- Report version without the '-internal' postfix

- Don't build against gdk making the accessibility depend on a particular
version of gtk.

Update to upstream tag jdk-11+27

- S8031761: [TESTBUG] Add a regression test for JDK-8026328

- S8151259: [TESTBUG] nsk/jvmti/RedefineClasses/redefclass030 fails with
'unexpected values of outer fields of the class' when running with -Xcomp

- S8164639: Configure PKCS11 tests to use user-supplied NSS libraries

- S8189667: Desktop#moveToTrash expects incorrect ' ALL FILES '
FilePermission

- S8194949: [Graal] gc/TestNUMAPageSize.java fail with OOM in

- Xcomp

- S8195156: [Graal] serviceability/jvmti/GetModulesInfo/
/JvmtiGetAllModulesTest.java fails with Graal in Xcomp mode

- S8199081: [Testbug] compiler/linkage/LinkageErrors.java fails if run
twice

- S8201394: Update java.se module summary to reflect remov ...

Description truncated, please see the referenced URL(s) for more information.

Affected Software/OS:
java-11-openjdk on openSUSE Leap 15.0.

Solution:
Please install the updated package(s).

CVSS Score:
6.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2018-3136
BugTraq ID: 105601
http://www.securityfocus.com/bid/105601
Debian Security Information: DSA-4326 (Google Search)
https://www.debian.org/security/2018/dsa-4326
https://lists.debian.org/debian-lts-announce/2018/11/msg00026.html
RedHat Security Advisories: RHSA-2018:2942
https://access.redhat.com/errata/RHSA-2018:2942
RedHat Security Advisories: RHSA-2018:2943
https://access.redhat.com/errata/RHSA-2018:2943
RedHat Security Advisories: RHSA-2018:3000
https://access.redhat.com/errata/RHSA-2018:3000
RedHat Security Advisories: RHSA-2018:3001
https://access.redhat.com/errata/RHSA-2018:3001
RedHat Security Advisories: RHSA-2018:3002
https://access.redhat.com/errata/RHSA-2018:3002
RedHat Security Advisories: RHSA-2018:3003
https://access.redhat.com/errata/RHSA-2018:3003
RedHat Security Advisories: RHSA-2018:3007
https://access.redhat.com/errata/RHSA-2018:3007
RedHat Security Advisories: RHSA-2018:3008
https://access.redhat.com/errata/RHSA-2018:3008
RedHat Security Advisories: RHSA-2018:3350
https://access.redhat.com/errata/RHSA-2018:3350
RedHat Security Advisories: RHSA-2018:3409
https://access.redhat.com/errata/RHSA-2018:3409
RedHat Security Advisories: RHSA-2018:3521
https://access.redhat.com/errata/RHSA-2018:3521
RedHat Security Advisories: RHSA-2018:3533
https://access.redhat.com/errata/RHSA-2018:3533
RedHat Security Advisories: RHSA-2018:3534
https://access.redhat.com/errata/RHSA-2018:3534
RedHat Security Advisories: RHSA-2018:3671
https://access.redhat.com/errata/RHSA-2018:3671
RedHat Security Advisories: RHSA-2018:3672
https://access.redhat.com/errata/RHSA-2018:3672
RedHat Security Advisories: RHSA-2018:3779
https://access.redhat.com/errata/RHSA-2018:3779
RedHat Security Advisories: RHSA-2018:3852
https://access.redhat.com/errata/RHSA-2018:3852
http://www.securitytracker.com/id/1041889
https://usn.ubuntu.com/3804-1/
https://usn.ubuntu.com/3824-1/
Common Vulnerability Exposure (CVE) ID: CVE-2018-3139
BugTraq ID: 105602
http://www.securityfocus.com/bid/105602
Common Vulnerability Exposure (CVE) ID: CVE-2018-3149
BugTraq ID: 105608
http://www.securityfocus.com/bid/105608
Common Vulnerability Exposure (CVE) ID: CVE-2018-3150
BugTraq ID: 105597
http://www.securityfocus.com/bid/105597
Common Vulnerability Exposure (CVE) ID: CVE-2018-3157
BugTraq ID: 105595
http://www.securityfocus.com/bid/105595
Common Vulnerability Exposure (CVE) ID: CVE-2018-3169
BugTraq ID: 105587
http://www.securityfocus.com/bid/105587
Common Vulnerability Exposure (CVE) ID: CVE-2018-3180
BugTraq ID: 105617
http://www.securityfocus.com/bid/105617
Common Vulnerability Exposure (CVE) ID: CVE-2018-3183
BugTraq ID: 105622
http://www.securityfocus.com/bid/105622
CopyrightCopyright (C) 2018 Greenbone Networks GmbH

This is only one of 73533 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Developer APIs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe

© 1998-2019 E-Soft Inc. All rights reserved.