Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
SUSE:SLE-12-SP2:Update
patchinfo.1574
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.1574
<patchinfo incident="1574"> <issue id="935540" tracker="bnc">VUL-1: IBM Java: The logjam Attack</issue> <issue id="955131" tracker="bnc">VUL-0: java: IBM java update november</issue> <issue id="930365" tracker="bnc">VUL-0: Java SE Version 7: Multiple CVE's fixed in new IBM java release SR9</issue> <issue id="912434" tracker="bnc">zypper in java-1_7_0-openjdk has problems with update-alternatives : ibm-java needs fixed update-alternatives</issue> <issue id="912447" tracker="bnc">The keystore of IBM java should point to our generated keystore</issue> <issue id="938895" tracker="bnc">VUL-0: java-1_5_0-ibm,java-1_6_0-ibm,java-1_7_0-ibm,java-1_7_1-ibm: IBM July 2015 Java update</issue> <issue id="941939" tracker="bnc">java-1_6_0-ibm (6.0-16.7) package break JCE symbolic links on update</issue> <issue id="931702" tracker="bnc">java-1_*_0-ibm package break JCE symbolic links on update</issue> <issue id="891701" tracker="bnc">VUL-0: java-1_7_0-ibm SR7-FP1</issue> <issue id="CVE-2015-4843" tracker="cve" /> <issue id="CVE-2015-4842" tracker="cve" /> <issue id="CVE-2015-4840" tracker="cve" /> <issue id="CVE-2015-4860" tracker="cve" /> <issue id="CVE-2015-5006" tracker="cve" /> <issue id="CVE-2015-4844" tracker="cve" /> <issue id="CVE-2015-4731" tracker="cve" /> <issue id="CVE-2015-4733" tracker="cve" /> <issue id="CVE-2015-4732" tracker="cve" /> <issue id="CVE-2015-4911" tracker="cve" /> <issue id="CVE-2015-4734" tracker="cve" /> <issue id="CVE-2015-0491" tracker="cve" /> <issue id="CVE-2015-4729" tracker="cve" /> <issue id="CVE-2014-4252" tracker="cve" /> <issue id="CVE-2015-4872" tracker="cve" /> <issue id="CVE-2014-4219" tracker="cve" /> <issue id="CVE-2015-2808" tracker="cve" /> <issue id="CVE-2015-4749" tracker="cve" /> <issue id="CVE-2015-2664" tracker="cve" /> <issue id="CVE-2015-2625" tracker="cve" /> <issue id="CVE-2015-2601" tracker="cve" /> <issue id="CVE-2015-2621" tracker="cve" /> <issue id="CVE-2015-4893" tracker="cve" /> <issue id="CVE-2015-2590" tracker="cve" /> <issue id="CVE-2015-4810" tracker="cve" /> <issue id="CVE-2015-0478" tracker="cve" /> <issue id="CVE-2015-0477" tracker="cve" /> <issue id="CVE-2015-0488" tracker="cve" /> <issue id="CVE-2015-0458" tracker="cve" /> <issue id="CVE-2015-0459" tracker="cve" /> <issue id="CVE-2015-4835" tracker="cve" /> <issue id="CVE-2014-4262" tracker="cve" /> <issue id="CVE-2014-4263" tracker="cve" /> <issue id="CVE-2015-4748" tracker="cve" /> <issue id="CVE-2014-4265" tracker="cve" /> <issue id="CVE-2014-4266" tracker="cve" /> <issue id="CVE-2015-4871" tracker="cve" /> <issue id="CVE-2014-4268" tracker="cve" /> <issue id="CVE-2015-4883" tracker="cve" /> <issue id="CVE-2014-4227" tracker="cve" /> <issue id="CVE-2015-4902" tracker="cve" /> <issue id="CVE-2014-4221" tracker="cve" /> <issue id="CVE-2014-4244" tracker="cve" /> <issue id="CVE-2015-4903" tracker="cve" /> <issue id="CVE-2015-4760" tracker="cve" /> <issue id="CVE-2015-0480" tracker="cve" /> <issue id="CVE-2015-4882" tracker="cve" /> <issue id="CVE-2014-4220" tracker="cve" /> <issue id="CVE-2015-0204" tracker="cve" /> <issue id="CVE-2014-4208" tracker="cve" /> <issue id="CVE-2014-4209" tracker="cve" /> <issue id="CVE-2015-0138" tracker="cve" /> <issue id="CVE-2015-2638" tracker="cve" /> <issue id="CVE-2015-4000" tracker="cve" /> <issue id="CVE-2015-2613" tracker="cve" /> <issue id="CVE-2015-2637" tracker="cve" /> <issue id="CVE-2015-2632" tracker="cve" /> <issue id="CVE-2015-2619" tracker="cve" /> <issue id="CVE-2015-4806" tracker="cve" /> <issue id="CVE-2015-4805" tracker="cve" /> <issue id="CVE-2015-0469" tracker="cve" /> <issue id="CVE-2015-1931" tracker="cve" /> <issue id="CVE-2014-4218" tracker="cve" /> <issue id="CVE-2015-1914" tracker="cve" /> <issue id="CVE-2015-4803" tracker="cve" /> <issue id="CVE-2015-0192" tracker="cve" /> <category>security</category> <rating>moderate</rating> <packager>scarabeus_iv</packager> <description>The java-1_7_0-ibm package was updated to version 7.0-9.20 to fix several security and non security issues: - bnc#955131: Version update to 7.0-9.20: CVE-2015-4734 CVE-2015-4803 CVE-2015-4805 CVE-2015-4806 CVE-2015-4810 CVE-2015-4835 CVE-2015-4840 CVE-2015-4842 CVE-2015-4843 CVE-2015-4844 CVE-2015-4860 CVE-2015-4871 CVE-2015-4872 CVE-2015-4882 CVE-2015-4883 CVE-2015-4893 CVE-2015-4902 CVE-2015-4903 CVE-2015-4911 CVE-2015-5006 - Add backcompat symlinks for sdkdir - bnc#941939: Fix to provide %{name} instead of %{sdklnk} only in _jvmprivdir - bnc#938895: Version update to 7.0-9.10: CVE-2015-1931 CVE-2015-2638 CVE-2015-4733 CVE-2015-4732 CVE-2015-2590 CVE-2015-4731 CVE-2015-4760 CVE-2015-4748 CVE-2015-2664 CVE-2015-2632 CVE-2015-2637 CVE-2015-2619 CVE-2015-2621 CVE-2015-2613 CVE-2015-2601 CVE-2015-4749 CVE-2015-4000 CVE-2015-4729 CVE-2015-2808 CVE-2015-2625 CVE-2015-0491 CVE-2015-0459 CVE-2015-0469 CVE-2015-0458 CVE-2015-0480 CVE-2015-0488 CVE-2015-0478 CVE-2015-0477 CVE-2015-0204 - bnc#935540: Version update to 7.0-9.1 for the logjam attack - Sync spec and baselibs.conf - Remove obsolete parts of update-alternatives from baselibs.conf - convert the baselibs to unix encoding - Do not bother with non-etc-marked-as-conf - Move plugin desktop/icon to proper subpackage - Fix fdupes usage and javapackages-tools vs jpackage-utils dependencies - Drop creation of 0 size xlfd support files as they are never regenerated anyway - Cleanup with spec-cleaner - bnc#930365: Version bum to 7.0-9.0: CVE-2015-0192 CVE-2015-2808 CVE-2015-1914 CVE-2015-0138 - bnc#931702: Fix removeing links before update-alternatives run. - bnc#912434: Fix javaws/plugin stuff should slave plugin update-alternatives - bnc#912447: Fix use system cacerts - Add condition for fdupes to build on SLE10 - bnc#891701: Version bump to 7.0-7.1 release wrt: * CVE-2014-4227 CVE-2014-4262 CVE-2014-4219 CVE-2014-4209 * CVE-2014-4220 CVE-2014-4268 CVE-2014-4218 CVE-2014-4252 * CVE-2014-4266 CVE-2014-4265 CVE-2014-4221 CVE-2014-4263 * CVE-2014-4244 CVE-2014-4208 - Fix build on i586 and s390 * Remove bogus dependency on libstdc++33 - Build fix in java-1_7_0-ibm-rpmlintrc * Filter out the "invalid license" errors to make build succeed. * Filter out the "files-duplicated-waste" since it is supposingly not safe to do %fdupes in this kind of packages - update qa_filelists.tar.bz2</description> <summary>Security update for java-1_7_0-ibm</summary> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor