SUSE-SU-2018:3921-1: important: Security update for java-1_7_1-ibm

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Tue Nov 27 04:13:58 MST 2018


   SUSE Security Update: Security update for java-1_7_1-ibm
______________________________________________________________________________

Announcement ID:    SUSE-SU-2018:3921-1
Rating:             important
References:         #1116574 
Cross-References:   CVE-2018-13785 CVE-2018-3136 CVE-2018-3139
                    CVE-2018-3149 CVE-2018-3169 CVE-2018-3180
                    CVE-2018-3214
Affected Products:
                    SUSE Linux Enterprise Software Development Kit 11-SP4
                    SUSE Linux Enterprise Server 11-SP4
______________________________________________________________________________

   An update that fixes 7 vulnerabilities is now available.

Description:


   java-1_7_1-ibm was updated to Java 7.1 Service Refresh 4 Fix Pack 35
   (bsc#1116574):

   * Consumability

     - IJ10515 AIX JAVA 7.1.3.10 GENERAL PROTECTION FAULT WHEN ATTEMPTING TO
       USE HEALTH CENTER API

   * Class Libraries

     - IJ10934 CVE-2018-13785
     - IJ10935 CVE-2018-3136
     - IJ10895 CVE-2018-3139
     - IJ10932 CVE-2018-3149
     - IJ10894 CVE-2018-3180
     - IJ10933 CVE-2018-3214
     - IJ09315 FLOATING POINT EXCEPTION FROM JAVA.TEXT.DECIMALFORMAT. FORMAT
     - IJ09088 INTRODUCING A NEW PROPERTY FOR TURKEY TIMEZONE FOR PRODUCTS
       NOT IDENTIFYING TRT
     - IJ08569 JAVA.IO.IOEXCEPTION OCCURS WHEN A FILECHANNEL IS BIGGER THAN
       2GB ON AIX PLATFORM
     - IJ10800 REMOVE EXPIRING ROOT CERTIFICATES IN IBM JDK’S CACERTS.

   * Java Virtual Machine

     - IJ10931 CVE-2018-3169
     - IV91132 SOME CORE PATTERN SPECIFIERS ARE NOT HANDLED BY THE JVM ON
       LINUX

   * JIT Compiler

     - IJ08205 CRASH WHILE COMPILING
     - IJ07886 INCORRECT CALUCATIONS WHEN USING NUMBERFORMAT.FORMAT() AND
       BIGDECIMAL.{FLOAT/DOUBLE }VALUE()

   * ORB

     - IX90187 CLIENTREQUESTIMPL.REINVO KE FAILS WITH
       JAVA.LANG.INDEXOUTOFBOUN DSEXCEPTION

   * Security

     - IJ10492 'EC KEYSIZE < 384' IS NOT HONORED USING THE
       'JDK.TLS.DISABLEDALGORIT HMS' SECURITY PROPERTY
     - IJ10491 AES/GCM CIPHER – AAD NOT RESET TO UN-INIT STATE AFTER
       DOFINAL( ) AND INIT( )
     - IJ08442 HTTP PUBLIC KEY PINNING FINGERPRINT,PROBLEM WITH CONVERTING TO
       JKS KEYSTORE
     - IJ09107 IBMPKCS11IMPL CRYPTO PROVIDER – INTERMITTENT ERROR WITH
       SECP521R1 SIGNATURE ON Z/OS
     - IJ10136 IBMPKCS11IMPL – INTERMITTENT ERROR WITH SECP521R1 SIG ON
       Z/OS AND Z/LINUX
     - IJ08530 IBMPKCS11IMPL PROVIDER USES THE WRONG RSA CIPHER MECHANISM FOR
       THE RSA/ECB/PKCS1PADDING CIPHER
     - IJ08723 JAAS THROWS A ‘ARRAY INDEX OUT OF RANGE’ EXCEPTION
     - IJ08704 THE SECURITY PROPERTY ‘JDK.CERTPATH.DISABLEDAL GORITHMS’
       IS MISTAKENLY BEING USED TO FILTER JAR SIGNING ALGORITHMS

   * z/OS Extentions

     - PH01244 OUTPUT BUFFER TOO SHORT FOR GCM MODE ENCRYPTION USING
       IBMJCEHYBRID


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Software Development Kit 11-SP4:

      zypper in -t patch sdksp4-java-1_7_1-ibm-13883=1

   - SUSE Linux Enterprise Server 11-SP4:

      zypper in -t patch slessp4-java-1_7_1-ibm-13883=1



Package List:

   - SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ppc64 s390x x86_64):

      java-1_7_1-ibm-devel-1.7.1_sr4.35-26.32.1

   - SUSE Linux Enterprise Server 11-SP4 (i586 ppc64 s390x x86_64):

      java-1_7_1-ibm-1.7.1_sr4.35-26.32.1
      java-1_7_1-ibm-jdbc-1.7.1_sr4.35-26.32.1

   - SUSE Linux Enterprise Server 11-SP4 (i586 x86_64):

      java-1_7_1-ibm-alsa-1.7.1_sr4.35-26.32.1
      java-1_7_1-ibm-plugin-1.7.1_sr4.35-26.32.1


References:

   https://www.suse.com/security/cve/CVE-2018-13785.html
   https://www.suse.com/security/cve/CVE-2018-3136.html
   https://www.suse.com/security/cve/CVE-2018-3139.html
   https://www.suse.com/security/cve/CVE-2018-3149.html
   https://www.suse.com/security/cve/CVE-2018-3169.html
   https://www.suse.com/security/cve/CVE-2018-3180.html
   https://www.suse.com/security/cve/CVE-2018-3214.html
   https://bugzilla.suse.com/1116574



More information about the sle-security-updates mailing list