![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.1.4.2018.0665.1 |
Category: | SuSE Local Security Checks |
Title: | SUSE: Security Advisory (SUSE-SU-2018:0665-1) |
Summary: | The remote host is missing an update for the 'java-1_8_0-ibm' package(s) announced via the SUSE-SU-2018:0665-1 advisory. |
Description: | Summary: The remote host is missing an update for the 'java-1_8_0-ibm' package(s) announced via the SUSE-SU-2018:0665-1 advisory. Vulnerability Insight: CVE-2018-2639 CVE-2018-2638 CVE-2018-2633 CVE-2018-2637 CVE-2018-2634 CVE-2018-2582 CVE-2018-2641 CVE-2018-2618 CVE-2018-2603 CVE-2018-2599 CVE-2018-2602 CVE-2018-2678 CVE-2018-2677 CVE-2018-2663 CVE-2018-2588 CVE-2018-2579 * Defect fixes: - IJ02608 Class Libraries: Change of namespace definitions with handlers that implement javax.xml.ws.handler.soap.soaphandler - IJ04280 Class Libraries: Deploy Upgrade to Oracle level 8u161-b12 - IJ03390 Class Libraries: JCL Upgrade to Oracle level 8u161-b12 - IJ04001 Class Libraries: Performance improvement with child process on AIX - IJ04281 Class Libraries: Startup time increase after applying apar IV96905 - IJ03822 Class Libraries: Update timezone information to tzdata2017c - IJ03440 Java Virtual Machine: Assertion failure during class creation - IJ03717 Java Virtual Machine: Assertion for gencon with concurrent scavenger on ZOS64 - IJ03513 Java Virtual Machine: Assertion in concurrent scavenger if initial heap memory size -Xms is set too low - IJ03994 Java Virtual Machine: Class.getmethods() does not return all methods - IJ03413 Java Virtual Machine: Hang creating thread after redefining classes - IJ03852 Java Virtual Machine: ICH408I message when groupaccess is specified with -xshareclasses - IJ03716 Java Virtual Machine: java/lang/linkageerror from sun/misc/unsafe.definean onymousclass() - IJ03116 Java Virtual Machine: java.fullversion string contains an extra space - IJ03347 Java Virtual Machine: java.lang.IllegalStateException in related class MemoryMXBean - IJ03878 Java Virtual Machine: java.lang.StackOverflowError is thrown when custom security manager in place - IJ03605 Java Virtual Machine: Legacy security for com.ibm.jvm.dump, trace, log was not enabled by default - IJ04248 JIT Compiler: ArrayIndexOutOfBoundsException is thrown when converting BigDecimal to String - IJ04250 JIT Compiler: Assertion failure with concurrentScavenge on Z14 - IJ03606 JIT Compiler: Java crashes with -version - IJ04251 JIT Compiler: JIT compiled method that takes advantage of AutoSIMD produces an incorrect result on x86 - IJ03854 JIT Compiler: JVM info message appears in stdout - IJ03607 JIT Compiler: Result String contains a redundant dot when converted from BigDecimal with 0 on all platforms - IX90185 ORB: Upgrade ibmcfw.jar to version O1800.01 - IJ03715 Security: Add additional support for the IBMJCEPlus provider, add support for new IBMJCEPlusFIPS provider - IJ03800 Security: A fix in CMS provider for KDB integrity - IJ04282 Security: Change in location and default of jurisdiction policy files - IJ03853 Security: IBMCAC provider does not support SHA224 - IJ02679 Security: IBMPKCS11Impl - Bad sessions are being allocated internally - IJ02706 Security: IBMPKCS11Impl - Bad sessions are being allocated internally - IJ03552 Security: IBMPKCS11Impl - ... [Please see the references for more information on the vulnerabilities] Affected Software/OS: 'java-1_8_0-ibm' package(s) on SUSE Linux Enterprise Server 12-SP1, SUSE Linux Enterprise Server 12-SP2, SUSE Linux Enterprise Server 12-SP3, SUSE Linux Enterprise Server for SAP Applications 12-SP1, SUSE Linux Enterprise Server for SAP Applications 12-SP2, SUSE Linux Enterprise Server for SAP Applications 12-SP3. Solution: Please install the updated package(s). CVSS Score: 6.8 CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2018-2579 BugTraq ID: 102663 http://www.securityfocus.com/bid/102663 Debian Security Information: DSA-4144 (Google Search) https://www.debian.org/security/2018/dsa-4144 Debian Security Information: DSA-4166 (Google Search) https://www.debian.org/security/2018/dsa-4166 https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html RedHat Security Advisories: RHSA-2018:0095 https://access.redhat.com/errata/RHSA-2018:0095 RedHat Security Advisories: RHSA-2018:0099 https://access.redhat.com/errata/RHSA-2018:0099 RedHat Security Advisories: RHSA-2018:0100 https://access.redhat.com/errata/RHSA-2018:0100 RedHat Security Advisories: RHSA-2018:0115 https://access.redhat.com/errata/RHSA-2018:0115 RedHat Security Advisories: RHSA-2018:0349 https://access.redhat.com/errata/RHSA-2018:0349 RedHat Security Advisories: RHSA-2018:0351 https://access.redhat.com/errata/RHSA-2018:0351 RedHat Security Advisories: RHSA-2018:0352 https://access.redhat.com/errata/RHSA-2018:0352 RedHat Security Advisories: RHSA-2018:0458 https://access.redhat.com/errata/RHSA-2018:0458 RedHat Security Advisories: RHSA-2018:0521 https://access.redhat.com/errata/RHSA-2018:0521 RedHat Security Advisories: RHSA-2018:1463 https://access.redhat.com/errata/RHSA-2018:1463 RedHat Security Advisories: RHSA-2018:1812 https://access.redhat.com/errata/RHSA-2018:1812 http://www.securitytracker.com/id/1040203 https://usn.ubuntu.com/3613-1/ https://usn.ubuntu.com/3614-1/ Common Vulnerability Exposure (CVE) ID: CVE-2018-2582 BugTraq ID: 102597 http://www.securityfocus.com/bid/102597 Common Vulnerability Exposure (CVE) ID: CVE-2018-2588 BugTraq ID: 102661 http://www.securityfocus.com/bid/102661 Common Vulnerability Exposure (CVE) ID: CVE-2018-2599 BugTraq ID: 102633 http://www.securityfocus.com/bid/102633 Common Vulnerability Exposure (CVE) ID: CVE-2018-2602 BugTraq ID: 102642 http://www.securityfocus.com/bid/102642 Common Vulnerability Exposure (CVE) ID: CVE-2018-2603 BugTraq ID: 102625 http://www.securityfocus.com/bid/102625 Common Vulnerability Exposure (CVE) ID: CVE-2018-2618 BugTraq ID: 102612 http://www.securityfocus.com/bid/102612 Common Vulnerability Exposure (CVE) ID: CVE-2018-2633 BugTraq ID: 102557 http://www.securityfocus.com/bid/102557 Common Vulnerability Exposure (CVE) ID: CVE-2018-2634 BugTraq ID: 102592 http://www.securityfocus.com/bid/102592 Common Vulnerability Exposure (CVE) ID: CVE-2018-2637 BugTraq ID: 102576 http://www.securityfocus.com/bid/102576 Common Vulnerability Exposure (CVE) ID: CVE-2018-2638 BugTraq ID: 102546 http://www.securityfocus.com/bid/102546 Common Vulnerability Exposure (CVE) ID: CVE-2018-2639 BugTraq ID: 102556 http://www.securityfocus.com/bid/102556 Common Vulnerability Exposure (CVE) ID: CVE-2018-2641 BugTraq ID: 102605 http://www.securityfocus.com/bid/102605 Common Vulnerability Exposure (CVE) ID: CVE-2018-2663 BugTraq ID: 102662 http://www.securityfocus.com/bid/102662 Common Vulnerability Exposure (CVE) ID: CVE-2018-2677 BugTraq ID: 102656 http://www.securityfocus.com/bid/102656 Common Vulnerability Exposure (CVE) ID: CVE-2018-2678 BugTraq ID: 102659 http://www.securityfocus.com/bid/102659 |
Copyright | Copyright (C) 2021 Greenbone AG |
This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |