SUSE-SU-2018:3921-1: important: Security update for java-1_7_1-ibm
sle-security-updates at lists.suse.com
sle-security-updates at lists.suse.com
Tue Nov 27 04:13:58 MST 2018
SUSE Security Update: Security update for java-1_7_1-ibm
______________________________________________________________________________
Announcement ID: SUSE-SU-2018:3921-1
Rating: important
References: #1116574
Cross-References: CVE-2018-13785 CVE-2018-3136 CVE-2018-3139
CVE-2018-3149 CVE-2018-3169 CVE-2018-3180
CVE-2018-3214
Affected Products:
SUSE Linux Enterprise Software Development Kit 11-SP4
SUSE Linux Enterprise Server 11-SP4
______________________________________________________________________________
An update that fixes 7 vulnerabilities is now available.
Description:
java-1_7_1-ibm was updated to Java 7.1 Service Refresh 4 Fix Pack 35
(bsc#1116574):
* Consumability
- IJ10515 AIX JAVA 7.1.3.10 GENERAL PROTECTION FAULT WHEN ATTEMPTING TO
USE HEALTH CENTER API
* Class Libraries
- IJ10934 CVE-2018-13785
- IJ10935 CVE-2018-3136
- IJ10895 CVE-2018-3139
- IJ10932 CVE-2018-3149
- IJ10894 CVE-2018-3180
- IJ10933 CVE-2018-3214
- IJ09315 FLOATING POINT EXCEPTION FROM JAVA.TEXT.DECIMALFORMAT. FORMAT
- IJ09088 INTRODUCING A NEW PROPERTY FOR TURKEY TIMEZONE FOR PRODUCTS
NOT IDENTIFYING TRT
- IJ08569 JAVA.IO.IOEXCEPTION OCCURS WHEN A FILECHANNEL IS BIGGER THAN
2GB ON AIX PLATFORM
- IJ10800 REMOVE EXPIRING ROOT CERTIFICATES IN IBM JDKâS CACERTS.
* Java Virtual Machine
- IJ10931 CVE-2018-3169
- IV91132 SOME CORE PATTERN SPECIFIERS ARE NOT HANDLED BY THE JVM ON
LINUX
* JIT Compiler
- IJ08205 CRASH WHILE COMPILING
- IJ07886 INCORRECT CALUCATIONS WHEN USING NUMBERFORMAT.FORMAT() AND
BIGDECIMAL.{FLOAT/DOUBLE }VALUE()
* ORB
- IX90187 CLIENTREQUESTIMPL.REINVO KE FAILS WITH
JAVA.LANG.INDEXOUTOFBOUN DSEXCEPTION
* Security
- IJ10492 'EC KEYSIZE < 384' IS NOT HONORED USING THE
'JDK.TLS.DISABLEDALGORIT HMS' SECURITY PROPERTY
- IJ10491 AES/GCM CIPHER â AAD NOT RESET TO UN-INIT STATE AFTER
DOFINAL( ) AND INIT( )
- IJ08442 HTTP PUBLIC KEY PINNING FINGERPRINT,PROBLEM WITH CONVERTING TO
JKS KEYSTORE
- IJ09107 IBMPKCS11IMPL CRYPTO PROVIDER â INTERMITTENT ERROR WITH
SECP521R1 SIGNATURE ON Z/OS
- IJ10136 IBMPKCS11IMPL â INTERMITTENT ERROR WITH SECP521R1 SIG ON
Z/OS AND Z/LINUX
- IJ08530 IBMPKCS11IMPL PROVIDER USES THE WRONG RSA CIPHER MECHANISM FOR
THE RSA/ECB/PKCS1PADDING CIPHER
- IJ08723 JAAS THROWS A âARRAY INDEX OUT OF RANGEâ EXCEPTION
- IJ08704 THE SECURITY PROPERTY âJDK.CERTPATH.DISABLEDAL GORITHMSâ
IS MISTAKENLY BEING USED TO FILTER JAR SIGNING ALGORITHMS
* z/OS Extentions
- PH01244 OUTPUT BUFFER TOO SHORT FOR GCM MODE ENCRYPTION USING
IBMJCEHYBRID
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 11-SP4:
zypper in -t patch sdksp4-java-1_7_1-ibm-13883=1
- SUSE Linux Enterprise Server 11-SP4:
zypper in -t patch slessp4-java-1_7_1-ibm-13883=1
Package List:
- SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ppc64 s390x x86_64):
java-1_7_1-ibm-devel-1.7.1_sr4.35-26.32.1
- SUSE Linux Enterprise Server 11-SP4 (i586 ppc64 s390x x86_64):
java-1_7_1-ibm-1.7.1_sr4.35-26.32.1
java-1_7_1-ibm-jdbc-1.7.1_sr4.35-26.32.1
- SUSE Linux Enterprise Server 11-SP4 (i586 x86_64):
java-1_7_1-ibm-alsa-1.7.1_sr4.35-26.32.1
java-1_7_1-ibm-plugin-1.7.1_sr4.35-26.32.1
References:
https://www.suse.com/security/cve/CVE-2018-13785.html
https://www.suse.com/security/cve/CVE-2018-3136.html
https://www.suse.com/security/cve/CVE-2018-3139.html
https://www.suse.com/security/cve/CVE-2018-3149.html
https://www.suse.com/security/cve/CVE-2018-3169.html
https://www.suse.com/security/cve/CVE-2018-3180.html
https://www.suse.com/security/cve/CVE-2018-3214.html
https://bugzilla.suse.com/1116574
More information about the sle-security-updates
mailing list