SUSE-SU-2018:3920-1: important: Security update for java-1_7_0-ibm
sle-security-updates at lists.suse.com
sle-security-updates at lists.suse.com
Tue Nov 27 04:13:16 MST 2018
SUSE Security Update: Security update for java-1_7_0-ibm
______________________________________________________________________________
Announcement ID: SUSE-SU-2018:3920-1
Rating: important
References: #1116574
Cross-References: CVE-2018-13785 CVE-2018-3136 CVE-2018-3139
CVE-2018-3149 CVE-2018-3169 CVE-2018-3180
CVE-2018-3214
Affected Products:
SUSE Linux Enterprise Server 11-SP3-LTSS
SUSE Linux Enterprise Point of Sale 11-SP3
______________________________________________________________________________
An update that fixes 7 vulnerabilities is now available.
Description:
java-1_7_0-ibm is updated to Java 7.0 Service Refresh 10 Fix Pack 35
(bsc#1116574):
* Class Libraries
- IJ10934 CVE-2018-13785
- IJ10935 CVE-2018-3136
- IJ10895 CVE-2018-3139
- IJ10932 CVE-2018-3149
- IJ10894 CVE-2018-3180
- IJ10933 CVE-2018-3214
- IJ09315 FLOATING POINT EXCEPTION FROM JAVA.TEXT.DECIMALFORMAT. FORMAT
- IJ09088 INTRODUCING A NEW PROPERTY FOR TURKEY TIMEZONE FOR PRODUCTS
NOT IDENTIFYING TRT
- IJ10800 REMOVE EXPIRING ROOT CERTIFICATES IN IBM JDKâS CACERTS
* Java Virtual Machine
- IJ10931 CVE-2018-3169
* JIT Compiler
- IJ08205 CRASH WHILE COMPILING
* Security
- IJ10492 'EC KEYSIZE < 384' IS NOT HONORED USING THE
'JDK.TLS.DISABLEDALGORIT HMS' SECURITY PROPERTY
- IJ10491 AES/GCM CIPHER â AAD NOT RESET TO UN-INIT STATE AFTER
DOFINAL( ) AND INIT( )
- IJ08442 HTTP PUBLIC KEY PINNING FINGERPRINT,PROBLEM WITH CONVERTING TO
JKS KEYSTORE
- IJ09107 IBMPKCS11IMPL CRYPTO PROVIDER â INTERMITTENT ERROR WITH
SECP521R1 SIGNATURE ON Z/OS
- IJ10136 IBMPKCS11IMPL â INTERMITTENT ERROR WITH SECP521R1 SIG ON
Z/OS AND Z/LINUX
- IJ08530 IBMPKCS11IMPL PROVIDER USES THE WRONG RSA CIPHER MECHANISM FOR
THE RSA/ECB/PKCS1PADDING CIPHER
- IJ08723 JAAS THROWS A âARRAY INDEX OUT OF RANGEâ EXCEPTION
- IJ08704 THE SECURITY PROPERTY âJDK.CERTPATH.DISABLEDAL GORITHMSâ
IS MISTAKENLY BEING USED TO FILTER JAR SIGNING ALGORITHMS
- PH01244 OUTPUT BUFFER TOO SHORT FOR GCM MODE ENCRYPTION USING
IBMJCEHYBRID
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server 11-SP3-LTSS:
zypper in -t patch slessp3-java-1_7_0-ibm-13882=1
- SUSE Linux Enterprise Point of Sale 11-SP3:
zypper in -t patch sleposp3-java-1_7_0-ibm-13882=1
Package List:
- SUSE Linux Enterprise Server 11-SP3-LTSS (i586 s390x x86_64):
java-1_7_0-ibm-1.7.0_sr10.35-65.31.1
java-1_7_0-ibm-devel-1.7.0_sr10.35-65.31.1
java-1_7_0-ibm-jdbc-1.7.0_sr10.35-65.31.1
- SUSE Linux Enterprise Server 11-SP3-LTSS (i586 x86_64):
java-1_7_0-ibm-alsa-1.7.0_sr10.35-65.31.1
java-1_7_0-ibm-plugin-1.7.0_sr10.35-65.31.1
- SUSE Linux Enterprise Point of Sale 11-SP3 (i586):
java-1_7_0-ibm-1.7.0_sr10.35-65.31.1
java-1_7_0-ibm-alsa-1.7.0_sr10.35-65.31.1
java-1_7_0-ibm-devel-1.7.0_sr10.35-65.31.1
java-1_7_0-ibm-jdbc-1.7.0_sr10.35-65.31.1
java-1_7_0-ibm-plugin-1.7.0_sr10.35-65.31.1
References:
https://www.suse.com/security/cve/CVE-2018-13785.html
https://www.suse.com/security/cve/CVE-2018-3136.html
https://www.suse.com/security/cve/CVE-2018-3139.html
https://www.suse.com/security/cve/CVE-2018-3149.html
https://www.suse.com/security/cve/CVE-2018-3169.html
https://www.suse.com/security/cve/CVE-2018-3180.html
https://www.suse.com/security/cve/CVE-2018-3214.html
https://bugzilla.suse.com/1116574
More information about the sle-security-updates
mailing list