SUSE-SU-2018:0645-1: important: Security update for java-1_7_0-ibm

sle-updates at lists.suse.com sle-updates at lists.suse.com
Fri Mar 9 04:09:56 MST 2018


   SUSE Security Update: Security update for java-1_7_0-ibm
______________________________________________________________________________

Announcement ID:    SUSE-SU-2018:0645-1
Rating:             important
References:         #1057460 #1076390 #1082810 #929900 #966304 
                    
Cross-References:   CVE-2018-2579 CVE-2018-2582 CVE-2018-2588
                    CVE-2018-2599 CVE-2018-2602 CVE-2018-2603
                    CVE-2018-2618 CVE-2018-2633 CVE-2018-2634
                    CVE-2018-2637 CVE-2018-2641 CVE-2018-2657
                    CVE-2018-2663 CVE-2018-2677 CVE-2018-2678
                   
Affected Products:
                    SUSE Linux Enterprise Server 11-SP3-LTSS
                    SUSE Linux Enterprise Point of Sale 11-SP3
______________________________________________________________________________

   An update that fixes 15 vulnerabilities is now available.

Description:



   This update for java-1_7_0-ibm provides the following fixes:

   The version was updated to 7.0.10.20 [bsc#1082810]:

   * Following security issues were fixed:

     - CVE-2018-2633 CVE-2018-2637 CVE-2018-2634 CVE-2018-2582 CVE-2018-2641
       CVE-2018-2618 CVE-2018-2657 CVE-2018-2603 CVE-2018-2599 CVE-2018-2602
       CVE-2018-2678 CVE-2018-2677 CVE-2018-2663 CVE-2018-2588 CVE-2018-2579

   * Defect fixes:

       - IJ04281 Class Libraries: Startup time increase after applying apar
         IV96905
       - IJ03822 Class Libraries: Update timezone information to tzdata2017c
       - IJ03605 Java Virtual Machine: Legacy security for com.ibm.jvm.dump,
         trace, log was not enabled by default
       - IJ03607 JIT Compiler: Result String contains a redundant dot when
         converted from BigDecimal with 0 on all platforms
       - IX90185 ORB: Upgrade ibmcfw.jar to version O1800.01
       - IJ04282 Security: Change in location and default of jurisdiction
         policy files
       - IJ03853 Security: IBMCAC provider does not support SHA224
       - IJ02679 Security: IBMPKCS11Impl – Bad sessions are being allocated
         internally
       - IJ02706 Security: IBMPKCS11Impl – Bad sessions are being allocated
         internally
       - IJ03552 Security: IBMPKCS11Impl - Config file problem with the slot
         specification attribute
       - IJ01901 Security: IBMPKCS11Impl – SecureRandom.setSeed() exception
       - IJ03801 Security: Issue with same DN certs, iKeyman GUI error with
         stash, JKS Chain issue and JVM argument parse issue with iKeyman
       - IJ02284 JIT Compiler: Division by zero in JIT compiler

       - Make it possible to run Java jnlp files from Firefox. (bsc#1057460)


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Server 11-SP3-LTSS:

      zypper in -t patch slessp3-java-1_7_0-ibm-13503=1

   - SUSE Linux Enterprise Point of Sale 11-SP3:

      zypper in -t patch sleposp3-java-1_7_0-ibm-13503=1

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Server 11-SP3-LTSS (i586 s390x x86_64):

      java-1_7_0-ibm-1.7.0_sr10.20-65.13.1
      java-1_7_0-ibm-devel-1.7.0_sr10.20-65.13.1
      java-1_7_0-ibm-jdbc-1.7.0_sr10.20-65.13.1

   - SUSE Linux Enterprise Server 11-SP3-LTSS (i586 x86_64):

      java-1_7_0-ibm-alsa-1.7.0_sr10.20-65.13.1
      java-1_7_0-ibm-plugin-1.7.0_sr10.20-65.13.1

   - SUSE Linux Enterprise Point of Sale 11-SP3 (i586):

      java-1_7_0-ibm-1.7.0_sr10.20-65.13.1
      java-1_7_0-ibm-alsa-1.7.0_sr10.20-65.13.1
      java-1_7_0-ibm-devel-1.7.0_sr10.20-65.13.1
      java-1_7_0-ibm-jdbc-1.7.0_sr10.20-65.13.1
      java-1_7_0-ibm-plugin-1.7.0_sr10.20-65.13.1


References:

   https://www.suse.com/security/cve/CVE-2018-2579.html
   https://www.suse.com/security/cve/CVE-2018-2582.html
   https://www.suse.com/security/cve/CVE-2018-2588.html
   https://www.suse.com/security/cve/CVE-2018-2599.html
   https://www.suse.com/security/cve/CVE-2018-2602.html
   https://www.suse.com/security/cve/CVE-2018-2603.html
   https://www.suse.com/security/cve/CVE-2018-2618.html
   https://www.suse.com/security/cve/CVE-2018-2633.html
   https://www.suse.com/security/cve/CVE-2018-2634.html
   https://www.suse.com/security/cve/CVE-2018-2637.html
   https://www.suse.com/security/cve/CVE-2018-2641.html
   https://www.suse.com/security/cve/CVE-2018-2657.html
   https://www.suse.com/security/cve/CVE-2018-2663.html
   https://www.suse.com/security/cve/CVE-2018-2677.html
   https://www.suse.com/security/cve/CVE-2018-2678.html
   https://bugzilla.suse.com/1057460
   https://bugzilla.suse.com/1076390
   https://bugzilla.suse.com/1082810
   https://bugzilla.suse.com/929900
   https://bugzilla.suse.com/966304



More information about the sle-updates mailing list