{"affected":[{"ecosystem_specific":{"binaries":[{"java-1_8_0-openjdk":"1.8.0.144-27.5.3","java-1_8_0-openjdk-demo":"1.8.0.144-27.5.3","java-1_8_0-openjdk-devel":"1.8.0.144-27.5.3","java-1_8_0-openjdk-headless":"1.8.0.144-27.5.3"}]},"package":{"ecosystem":"SUSE:OpenStack Cloud 6","name":"java-1_8_0-openjdk","purl":"pkg:rpm/suse/java-1_8_0-openjdk&distro=SUSE%20OpenStack%20Cloud%206"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.8.0.144-27.5.3"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"java-1_8_0-openjdk":"1.8.0.144-27.5.3","java-1_8_0-openjdk-headless":"1.8.0.144-27.5.3"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Desktop 12 SP2","name":"java-1_8_0-openjdk","purl":"pkg:rpm/suse/java-1_8_0-openjdk&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.8.0.144-27.5.3"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"java-1_8_0-openjdk":"1.8.0.144-27.5.3","java-1_8_0-openjdk-headless":"1.8.0.144-27.5.3"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Desktop 12 SP3","name":"java-1_8_0-openjdk","purl":"pkg:rpm/suse/java-1_8_0-openjdk&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.8.0.144-27.5.3"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"java-1_8_0-openjdk":"1.8.0.144-27.5.3","java-1_8_0-openjdk-demo":"1.8.0.144-27.5.3","java-1_8_0-openjdk-devel":"1.8.0.144-27.5.3","java-1_8_0-openjdk-headless":"1.8.0.144-27.5.3"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for Raspberry Pi 12 SP2","name":"java-1_8_0-openjdk","purl":"pkg:rpm/suse/java-1_8_0-openjdk&distro=SUSE%20Linux%20Enterprise%20Server%20for%20Raspberry%20Pi%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.8.0.144-27.5.3"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"java-1_8_0-openjdk":"1.8.0.144-27.5.3","java-1_8_0-openjdk-demo":"1.8.0.144-27.5.3","java-1_8_0-openjdk-devel":"1.8.0.144-27.5.3","java-1_8_0-openjdk-headless":"1.8.0.144-27.5.3"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP1","name":"java-1_8_0-openjdk","purl":"pkg:rpm/suse/java-1_8_0-openjdk&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.8.0.144-27.5.3"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"java-1_8_0-openjdk":"1.8.0.144-27.5.3","java-1_8_0-openjdk-demo":"1.8.0.144-27.5.3","java-1_8_0-openjdk-devel":"1.8.0.144-27.5.3","java-1_8_0-openjdk-headless":"1.8.0.144-27.5.3"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP1-LTSS","name":"java-1_8_0-openjdk","purl":"pkg:rpm/suse/java-1_8_0-openjdk&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.8.0.144-27.5.3"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"java-1_8_0-openjdk":"1.8.0.144-27.5.3","java-1_8_0-openjdk-demo":"1.8.0.144-27.5.3","java-1_8_0-openjdk-devel":"1.8.0.144-27.5.3","java-1_8_0-openjdk-headless":"1.8.0.144-27.5.3"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP2","name":"java-1_8_0-openjdk","purl":"pkg:rpm/suse/java-1_8_0-openjdk&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.8.0.144-27.5.3"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"java-1_8_0-openjdk":"1.8.0.144-27.5.3","java-1_8_0-openjdk-demo":"1.8.0.144-27.5.3","java-1_8_0-openjdk-devel":"1.8.0.144-27.5.3","java-1_8_0-openjdk-headless":"1.8.0.144-27.5.3"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP2","name":"java-1_8_0-openjdk","purl":"pkg:rpm/suse/java-1_8_0-openjdk&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.8.0.144-27.5.3"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"java-1_8_0-openjdk":"1.8.0.144-27.5.3","java-1_8_0-openjdk-demo":"1.8.0.144-27.5.3","java-1_8_0-openjdk-devel":"1.8.0.144-27.5.3","java-1_8_0-openjdk-headless":"1.8.0.144-27.5.3"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP3","name":"java-1_8_0-openjdk","purl":"pkg:rpm/suse/java-1_8_0-openjdk&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.8.0.144-27.5.3"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"java-1_8_0-openjdk":"1.8.0.144-27.5.3","java-1_8_0-openjdk-demo":"1.8.0.144-27.5.3","java-1_8_0-openjdk-devel":"1.8.0.144-27.5.3","java-1_8_0-openjdk-headless":"1.8.0.144-27.5.3"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP3","name":"java-1_8_0-openjdk","purl":"pkg:rpm/suse/java-1_8_0-openjdk&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.8.0.144-27.5.3"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This java-1_8_0-openjdk update to version jdk8u141 (icedtea 3.5.0) fixes the following issues:\n\nSecurity issues fixed:\n- CVE-2017-10053: Improved image post-processing steps (bsc#1049305)\n- CVE-2017-10067: Additional jar validation steps (bsc#1049306)\n- CVE-2017-10074: Image conversion improvements (bsc#1049307)\n- CVE-2017-10078: Better script accessibility for JavaScript (bsc#1049308)\n- CVE-2017-10081: Right parenthesis issue (bsc#1049309)\n- CVE-2017-10086: Unspecified vulnerability in subcomponent JavaFX (bsc#1049310)\n- CVE-2017-10087: Better Thread Pool execution (bsc#1049311)\n- CVE-2017-10089: Service Registration Lifecycle (bsc#1049312)\n- CVE-2017-10090: Better handling of channel groups (bsc#1049313)\n- CVE-2017-10096: Transform Transformer Exceptions (bsc#1049314)\n- CVE-2017-10101: Better reading of text catalogs (bsc#1049315)\n- CVE-2017-10102: Improved garbage collection (bsc#1049316)\n- CVE-2017-10105: Unspecified vulnerability in subcomponent deployment (bsc#1049317)\n- CVE-2017-10107: Less Active Activations (bsc#1049318)\n- CVE-2017-10108: Better naming attribution (bsc#1049319)\n- CVE-2017-10109: Better sourcing of code (bsc#1049320)\n- CVE-2017-10110: Better image fetching (bsc#1049321)\n- CVE-2017-10111: Rearrange MethodHandle arrangements (bsc#1049322)\n- CVE-2017-10114: Unspecified vulnerability in subcomponent JavaFX (bsc#1049323)\n- CVE-2017-10115: Higher quality DSA operations (bsc#1049324)\n- CVE-2017-10116: Proper directory lookup processing (bsc#1049325)\n- CVE-2017-10118: Higher quality ECDSA operations (bsc#1049326)\n- CVE-2017-10125: Unspecified vulnerability in subcomponent deployment (bsc#1049327)\n- CVE-2017-10135: Better handling of PKCS8 material (bsc#1049328)\n- CVE-2017-10176: Additional elliptic curve support (bsc#1049329)\n- CVE-2017-10193: Improve algorithm constraints implementation (bsc#1049330)\n- CVE-2017-10198: Clear certificate chain connections (bsc#1049331)\n- CVE-2017-10243: Unspecified vulnerability in subcomponent JAX-WS (bsc#1049332)\n\nBug fixes:\n- Check registry registration location\n- Improved certificate processing\n- JMX diagnostic improvements\n- Update to libpng 1.6.28\n- Import of OpenJDK 8 u141 build 15 (bsc#1049302)\n\nNew features:\n- Support using RSAandMGF1 with the SHA hash algorithms in the PKCS11 provider\n\n","id":"SUSE-SU-2017:2175-1","modified":"2017-08-16T09:33:22Z","published":"2017-08-16T09:33:22Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2017/suse-su-20172175-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1049302"},{"type":"REPORT","url":"https://bugzilla.suse.com/1049305"},{"type":"REPORT","url":"https://bugzilla.suse.com/1049306"},{"type":"REPORT","url":"https://bugzilla.suse.com/1049307"},{"type":"REPORT","url":"https://bugzilla.suse.com/1049308"},{"type":"REPORT","url":"https://bugzilla.suse.com/1049309"},{"type":"REPORT","url":"https://bugzilla.suse.com/1049310"},{"type":"REPORT","url":"https://bugzilla.suse.com/1049311"},{"type":"REPORT","url":"https://bugzilla.suse.com/1049312"},{"type":"REPORT","url":"https://bugzilla.suse.com/1049313"},{"type":"REPORT","url":"https://bugzilla.suse.com/1049314"},{"type":"REPORT","url":"https://bugzilla.suse.com/1049315"},{"type":"REPORT","url":"https://bugzilla.suse.com/1049316"},{"type":"REPORT","url":"https://bugzilla.suse.com/1049317"},{"type":"REPORT","url":"https://bugzilla.suse.com/1049318"},{"type":"REPORT","url":"https://bugzilla.suse.com/1049319"},{"type":"REPORT","url":"https://bugzilla.suse.com/1049320"},{"type":"REPORT","url":"https://bugzilla.suse.com/1049321"},{"type":"REPORT","url":"https://bugzilla.suse.com/1049322"},{"type":"REPORT","url":"https://bugzilla.suse.com/1049323"},{"type":"REPORT","url":"https://bugzilla.suse.com/1049324"},{"type":"REPORT","url":"https://bugzilla.suse.com/1049325"},{"type":"REPORT","url":"https://bugzilla.suse.com/1049326"},{"type":"REPORT","url":"https://bugzilla.suse.com/1049327"},{"type":"REPORT","url":"https://bugzilla.suse.com/1049328"},{"type":"REPORT","url":"https://bugzilla.suse.com/1049329"},{"type":"REPORT","url":"https://bugzilla.suse.com/1049330"},{"type":"REPORT","url":"https://bugzilla.suse.com/1049331"},{"type":"REPORT","url":"https://bugzilla.suse.com/1049332"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-10053"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-10067"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-10074"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-10078"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-10081"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-10086"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-10087"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-10089"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-10090"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-10096"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-10101"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-10102"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-10105"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-10107"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-10108"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-10109"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-10110"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-10111"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-10114"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-10115"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-10116"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-10118"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-10125"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-10135"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-10176"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-10193"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-10198"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-10243"}],"related":["CVE-2017-10053","CVE-2017-10067","CVE-2017-10074","CVE-2017-10078","CVE-2017-10081","CVE-2017-10086","CVE-2017-10087","CVE-2017-10089","CVE-2017-10090","CVE-2017-10096","CVE-2017-10101","CVE-2017-10102","CVE-2017-10105","CVE-2017-10107","CVE-2017-10108","CVE-2017-10109","CVE-2017-10110","CVE-2017-10111","CVE-2017-10114","CVE-2017-10115","CVE-2017-10116","CVE-2017-10118","CVE-2017-10125","CVE-2017-10135","CVE-2017-10176","CVE-2017-10193","CVE-2017-10198","CVE-2017-10243"],"summary":"Security update for java-1_8_0-openjdk","upstream":["CVE-2017-10053","CVE-2017-10067","CVE-2017-10074","CVE-2017-10078","CVE-2017-10081","CVE-2017-10086","CVE-2017-10087","CVE-2017-10089","CVE-2017-10090","CVE-2017-10096","CVE-2017-10101","CVE-2017-10102","CVE-2017-10105","CVE-2017-10107","CVE-2017-10108","CVE-2017-10109","CVE-2017-10110","CVE-2017-10111","CVE-2017-10114","CVE-2017-10115","CVE-2017-10116","CVE-2017-10118","CVE-2017-10125","CVE-2017-10135","CVE-2017-10176","CVE-2017-10193","CVE-2017-10198","CVE-2017-10243"]}