Search 211766 CVE descriptions
and 97459 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:
Category:SuSE Local Security Checks
Title:SUSE: Security Advisory (SUSE-SU-2018:0645-1)
Summary:The remote host is missing an update for the 'java-1_7_0-ibm' package(s) announced via the SUSE-SU-2018:0645-1 advisory.
The remote host is missing an update for the 'java-1_7_0-ibm' package(s) announced via the SUSE-SU-2018:0645-1 advisory.

Vulnerability Insight:
This update for java-1_7_0-ibm provides the following fixes:
The version was updated to [bsc#1082810]:
* Following security issues were fixed:
- CVE-2018-2633 CVE-2018-2637 CVE-2018-2634 CVE-2018-2582 CVE-2018-2641
CVE-2018-2618 CVE-2018-2657 CVE-2018-2603 CVE-2018-2599 CVE-2018-2602
CVE-2018-2678 CVE-2018-2677 CVE-2018-2663 CVE-2018-2588 CVE-2018-2579
* Defect fixes:
- IJ04281 Class Libraries: Startup time increase after applying apar
- IJ03822 Class Libraries: Update timezone information to tzdata2017c
- IJ03605 Java Virtual Machine: Legacy security for,
trace, log was not enabled by default
- IJ03607 JIT Compiler: Result String contains a redundant dot when
converted from BigDecimal with 0 on all platforms
- IX90185 ORB: Upgrade ibmcfw.jar to version O1800.01
- IJ04282 Security: Change in location and default of jurisdiction
policy files
- IJ03853 Security: IBMCAC provider does not support SHA224
- IJ02679 Security: IBMPKCS11Impl AC/AEURA' Bad sessions are being allocated
- IJ02706 Security: IBMPKCS11Impl AC/AEURA' Bad sessions are being allocated
- IJ03552 Security: IBMPKCS11Impl - Config file problem with the slot
specification attribute
- IJ01901 Security: IBMPKCS11Impl AC/AEURA' SecureRandom.setSeed() exception
- IJ03801 Security: Issue with same DN certs, iKeyman GUI error with
stash, JKS Chain issue and JVM argument parse issue with iKeyman
- IJ02284 JIT Compiler: Division by zero in JIT compiler
- Make it possible to run Java jnlp files from Firefox. (bsc#1057460)

Affected Software/OS:
'java-1_7_0-ibm' package(s) on SUSE Linux Enterprise Server 11-SP3, SUSE Linux Enterprise Point of Sale 11-SP3

Please install the updated package(s).

CVSS Score:

CVSS Vector:

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2018-2579
BugTraq ID: 102663
Debian Security Information: DSA-4144 (Google Search)
Debian Security Information: DSA-4166 (Google Search)
RedHat Security Advisories: RHSA-2018:0095
RedHat Security Advisories: RHSA-2018:0099
RedHat Security Advisories: RHSA-2018:0100
RedHat Security Advisories: RHSA-2018:0115
RedHat Security Advisories: RHSA-2018:0349
RedHat Security Advisories: RHSA-2018:0351
RedHat Security Advisories: RHSA-2018:0352
RedHat Security Advisories: RHSA-2018:0458
RedHat Security Advisories: RHSA-2018:0521
RedHat Security Advisories: RHSA-2018:1463
RedHat Security Advisories: RHSA-2018:1812
Common Vulnerability Exposure (CVE) ID: CVE-2018-2582
BugTraq ID: 102597
Common Vulnerability Exposure (CVE) ID: CVE-2018-2588
BugTraq ID: 102661
Common Vulnerability Exposure (CVE) ID: CVE-2018-2599
BugTraq ID: 102633
Common Vulnerability Exposure (CVE) ID: CVE-2018-2602
BugTraq ID: 102642
Common Vulnerability Exposure (CVE) ID: CVE-2018-2603
BugTraq ID: 102625
Common Vulnerability Exposure (CVE) ID: CVE-2018-2618
BugTraq ID: 102612
Common Vulnerability Exposure (CVE) ID: CVE-2018-2633
BugTraq ID: 102557
Common Vulnerability Exposure (CVE) ID: CVE-2018-2634
BugTraq ID: 102592
Common Vulnerability Exposure (CVE) ID: CVE-2018-2637
BugTraq ID: 102576
Common Vulnerability Exposure (CVE) ID: CVE-2018-2641
BugTraq ID: 102605
Common Vulnerability Exposure (CVE) ID: CVE-2018-2657
BugTraq ID: 102629
Common Vulnerability Exposure (CVE) ID: CVE-2018-2663
BugTraq ID: 102662
Common Vulnerability Exposure (CVE) ID: CVE-2018-2677
BugTraq ID: 102656
Common Vulnerability Exposure (CVE) ID: CVE-2018-2678
BugTraq ID: 102659
CopyrightCopyright (C) 2021 Greenbone Networks GmbH

This is only one of 97459 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

© 1998-2021 E-Soft Inc. All rights reserved.