Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | |||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.851560 |
Kategorie: | SuSE Local Security Checks |
Titel: | openSUSE: Security Advisory for java-1_7_0-openjdk (openSUSE-SU-2017:1429-1) |
Zusammenfassung: | The remote host is missing an update for the 'java-1_7_0-openjdk'; package(s) announced via the referenced advisory. |
Beschreibung: | Summary: The remote host is missing an update for the 'java-1_7_0-openjdk' package(s) announced via the referenced advisory. Vulnerability Insight: This update for java-1_7_0-openjdk fixes the following issues: - Update to 2.6.10 - OpenJDK 7u141 (bsc#1034849) * Security fixes - S8163520, CVE-2017-3509: Reuse cache entries - S8163528, CVE-2017-3511: Better library loading - S8165626, CVE-2017-3512: Improved window framing - S8167110, CVE-2017-3514: Windows peering issue - S8169011, CVE-2017-3526: Resizing XML parse trees - S8170222, CVE-2017-3533: Better transfers of files - S8171121, CVE-2017-3539: Enhancing jar checking - S8171533, CVE-2017-3544: Better email transfer - S8172299: Improve class processing * New features - PR3347: jstack.stp should support AArch64 * Import of OpenJDK 7 u141 build 0 - S4717864: setFont() does not update Fonts of Menus already on screen - S6474807: (smartcardio) CardTerminal.connect() throws CardException instead of CardNotPresentException - S6518907: cleanup IA64 specific code in Hotspot - S6869327: Add new C2 flag to keep safepoints in counted loops. - S7112912: Message 'Error occurred during initialization of VM' on boxes with lots of RAM - S7124213: [macosx] pack() does ignore size of a component doesn't on the other platforms - S7124219: [macosx] Unable to draw images to fullscreen - S7124552: [macosx] NullPointerException in getBufferStrategy() - S7148275: [macosx] setIconImages() not working correctly (distorted icon when minimized) - S7154841: [macosx] Popups appear behind taskbar - S7155957: closed/java/awt/MenuBar/MenuBarStress1/MenuBarStress1.java hangs on win 64 bit with jdk8 - S7160627: [macosx] TextArea has wrong initial size - S7167293: FtpURLConnection connection leak on FileNotFoundException - S7168851: [macosx] Netbeans crashes in CImage.nativeCreateNSImageFromArray - S7197203: sun/misc/URLClassPath/ClassnameCharTest.sh failed, compile error - S8005255: [macosx] Cleanup warnings in sun.lwawt - S8006088: Incompatible heap size flags accepted by VM - S8007295: Reduce number of warnings in awt classes - S8010722: assert: failed: heap size is too big for compressed oops - S8011059: [macosx] Support automatic @2x images loading on Mac OS X - S8014058: Regression tests for 8006088 - S8014489: tests/gc/arguments/Test(SerialCMSParallelG1)HeapSizeFlags jtreg tests invoke wrong class - S8016302: Change type of the number of GC workers to unsigned int (2) - S8024662: gc/arguments/TestUseCompressedOopsErgo.java does not compile. - S8024669: Native OOME when allocating after changes to maximum heap supporting Coops sizing on sparcv9 - S8024926: [macosx] AquaIcon HiDPI support ... Description truncated, please see the referenced URL(s) for more information. Affected Software/OS: java-1_7_0-openjdk on openSUSE Leap 42.2 Solution: Please install the updated package(s). CVSS Score: 7.1 CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:C |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2017-3289 BugTraq ID: 95525 http://www.securityfocus.com/bid/95525 Debian Security Information: DSA-3782 (Google Search) http://www.debian.org/security/2017/dsa-3782 https://security.gentoo.org/glsa/201701-65 https://security.gentoo.org/glsa/201707-01 RedHat Security Advisories: RHSA-2017:0175 http://rhn.redhat.com/errata/RHSA-2017-0175.html RedHat Security Advisories: RHSA-2017:0176 http://rhn.redhat.com/errata/RHSA-2017-0176.html RedHat Security Advisories: RHSA-2017:0180 http://rhn.redhat.com/errata/RHSA-2017-0180.html RedHat Security Advisories: RHSA-2017:0263 http://rhn.redhat.com/errata/RHSA-2017-0263.html RedHat Security Advisories: RHSA-2017:0269 http://rhn.redhat.com/errata/RHSA-2017-0269.html RedHat Security Advisories: RHSA-2017:0336 http://rhn.redhat.com/errata/RHSA-2017-0336.html RedHat Security Advisories: RHSA-2017:0337 http://rhn.redhat.com/errata/RHSA-2017-0337.html RedHat Security Advisories: RHSA-2017:1216 https://access.redhat.com/errata/RHSA-2017:1216 http://www.securitytracker.com/id/1037637 Common Vulnerability Exposure (CVE) ID: CVE-2017-3509 BugTraq ID: 97737 http://www.securityfocus.com/bid/97737 Debian Security Information: DSA-3858 (Google Search) http://www.debian.org/security/2017/dsa-3858 https://security.gentoo.org/glsa/201705-03 RedHat Security Advisories: RHSA-2017:1108 https://access.redhat.com/errata/RHSA-2017:1108 RedHat Security Advisories: RHSA-2017:1109 https://access.redhat.com/errata/RHSA-2017:1109 RedHat Security Advisories: RHSA-2017:1117 https://access.redhat.com/errata/RHSA-2017:1117 RedHat Security Advisories: RHSA-2017:1118 https://access.redhat.com/errata/RHSA-2017:1118 RedHat Security Advisories: RHSA-2017:1119 https://access.redhat.com/errata/RHSA-2017:1119 RedHat Security Advisories: RHSA-2017:1204 https://access.redhat.com/errata/RHSA-2017:1204 RedHat Security Advisories: RHSA-2017:1220 https://access.redhat.com/errata/RHSA-2017:1220 RedHat Security Advisories: RHSA-2017:1221 https://access.redhat.com/errata/RHSA-2017:1221 RedHat Security Advisories: RHSA-2017:1222 https://access.redhat.com/errata/RHSA-2017:1222 RedHat Security Advisories: RHSA-2017:3453 https://access.redhat.com/errata/RHSA-2017:3453 http://www.securitytracker.com/id/1038286 Common Vulnerability Exposure (CVE) ID: CVE-2017-3511 BugTraq ID: 97731 http://www.securityfocus.com/bid/97731 Common Vulnerability Exposure (CVE) ID: CVE-2017-3512 BugTraq ID: 97727 http://www.securityfocus.com/bid/97727 Common Vulnerability Exposure (CVE) ID: CVE-2017-3514 BugTraq ID: 97729 http://www.securityfocus.com/bid/97729 Common Vulnerability Exposure (CVE) ID: CVE-2017-3526 BugTraq ID: 97733 http://www.securityfocus.com/bid/97733 Common Vulnerability Exposure (CVE) ID: CVE-2017-3533 BugTraq ID: 97740 http://www.securityfocus.com/bid/97740 Common Vulnerability Exposure (CVE) ID: CVE-2017-3539 BugTraq ID: 97752 http://www.securityfocus.com/bid/97752 Common Vulnerability Exposure (CVE) ID: CVE-2017-3544 BugTraq ID: 97745 http://www.securityfocus.com/bid/97745 |
Copyright | Copyright (C) 2017 Greenbone Networks GmbH |
Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |