SUSE-SU-2018:0743-1: important: Security update for java-1_7_1-ibm
sle-updates at lists.suse.com
sle-updates at lists.suse.com
Mon Mar 19 11:08:55 MDT 2018
SUSE Security Update: Security update for java-1_7_1-ibm
______________________________________________________________________________
Announcement ID: SUSE-SU-2018:0743-1
Rating: important
References: #1057460 #1076390 #1082810 #1085018 #929900
#955131 #966304
Cross-References: CVE-2018-2579 CVE-2018-2582 CVE-2018-2588
CVE-2018-2599 CVE-2018-2602 CVE-2018-2603
CVE-2018-2618 CVE-2018-2633 CVE-2018-2634
CVE-2018-2637 CVE-2018-2641 CVE-2018-2657
CVE-2018-2663 CVE-2018-2677 CVE-2018-2678
Affected Products:
SUSE OpenStack Cloud 6
SUSE Linux Enterprise Software Development Kit 12-SP3
SUSE Linux Enterprise Software Development Kit 12-SP2
SUSE Linux Enterprise Server for SAP 12-SP1
SUSE Linux Enterprise Server 12-SP3
SUSE Linux Enterprise Server 12-SP2
SUSE Linux Enterprise Server 12-SP1-LTSS
SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________
An update that fixes 15 vulnerabilities is now available.
Description:
This update for java-1_7_1-ibm fixes the following issue:
The version was updated to 7.1.4.20 [bsc#1082810]
* Security fixes:
- CVE-2018-2633 CVE-2018-2637 CVE-2018-2634 CVE-2018-2582 CVE-2018-2641
CVE-2018-2618 CVE-2018-2657 CVE-2018-2603 CVE-2018-2599 CVE-2018-2602
CVE-2018-2678 CVE-2018-2677 CVE-2018-2663 CVE-2018-2588 CVE-2018-2579
* Defect fixes:
- IJ04281 Class Libraries: Startup time increase after applying apar
IV96905
- IJ03822 Class Libraries: Update timezone information to tzdata2017c
- IJ03605 Java Virtual Machine: Legacy security for com.ibm.jvm.dump,
trace, log was not enabled by default
- IJ03607 JIT Compiler: Result String contains a redundant dot when
converted from BigDecimal with 0 on all platforms
- IX90185 ORB: Upgrade ibmcfw.jar to version O1800.01
- IJ04282 Security: Change in location and default of jurisdiction
policy files
- IJ03853 Security: IBMCAC provider does not support SHA224
- IJ02679 Security: IBMPKCS11Impl -- Bad sessions are being allocated
internally
- IJ02706 Security: IBMPKCS11Impl -- Bad sessions are being allocated
internally
- IJ03552 Security: IBMPKCS11Impl -- Config file problem with the slot
specification attribute
- IJ01901 Security: IBMPKCS11Impl -- SecureRandom.setSeed() exception
- IJ03801 Security: Issue with same DN certs, iKeyman GUI error with
stash, JKS Chain issue and JVM argument parse issue with iKeyman
- IJ03256 Security: javax.security.auth.Subject.toString() throws NPE
- IJ02284 JIT Compiler: Division by zero in JIT compiler
* SUSE fixes:
- Make it possible to run Java jnlp files from Firefox. (bsc#1057460)
- Fixed jpackage-java-1_7_1-ibm-webstart.desktop file to allow Java jnlp
files run from Firefox. [bsc#1057460, bsc#1076390]
- Fix javaws segfaults when java expiration timer has elapsed.
[bsc#929900]
- Provide IBM Java updates for IBMs PMR 55931,671,760 and for SUSEs SR
110991601735. [bsc#966304]
- Ensure that all Java policy files are symlinked into the proper file
system locations. Without those symlinks, several OES iManager plugins
did not function properly. [bsc#1085018]
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE OpenStack Cloud 6:
zypper in -t patch SUSE-OpenStack-Cloud-6-2018-498=1
- SUSE Linux Enterprise Software Development Kit 12-SP3:
zypper in -t patch SUSE-SLE-SDK-12-SP3-2018-498=1
- SUSE Linux Enterprise Software Development Kit 12-SP2:
zypper in -t patch SUSE-SLE-SDK-12-SP2-2018-498=1
- SUSE Linux Enterprise Server for SAP 12-SP1:
zypper in -t patch SUSE-SLE-SAP-12-SP1-2018-498=1
- SUSE Linux Enterprise Server 12-SP3:
zypper in -t patch SUSE-SLE-SERVER-12-SP3-2018-498=1
- SUSE Linux Enterprise Server 12-SP2:
zypper in -t patch SUSE-SLE-SERVER-12-SP2-2018-498=1
- SUSE Linux Enterprise Server 12-SP1-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-SP1-2018-498=1
- SUSE Linux Enterprise Server 12-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-2018-498=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE OpenStack Cloud 6 (x86_64):
java-1_7_1-ibm-1.7.1_sr4.20-38.16.1
java-1_7_1-ibm-alsa-1.7.1_sr4.20-38.16.1
java-1_7_1-ibm-devel-1.7.1_sr4.20-38.16.1
java-1_7_1-ibm-jdbc-1.7.1_sr4.20-38.16.1
java-1_7_1-ibm-plugin-1.7.1_sr4.20-38.16.1
- SUSE Linux Enterprise Software Development Kit 12-SP3 (ppc64le s390x x86_64):
java-1_7_1-ibm-devel-1.7.1_sr4.20-38.16.1
- SUSE Linux Enterprise Software Development Kit 12-SP2 (ppc64le s390x x86_64):
java-1_7_1-ibm-devel-1.7.1_sr4.20-38.16.1
- SUSE Linux Enterprise Server for SAP 12-SP1 (ppc64le x86_64):
java-1_7_1-ibm-1.7.1_sr4.20-38.16.1
java-1_7_1-ibm-devel-1.7.1_sr4.20-38.16.1
java-1_7_1-ibm-jdbc-1.7.1_sr4.20-38.16.1
- SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64):
java-1_7_1-ibm-alsa-1.7.1_sr4.20-38.16.1
java-1_7_1-ibm-plugin-1.7.1_sr4.20-38.16.1
- SUSE Linux Enterprise Server 12-SP3 (ppc64le s390x x86_64):
java-1_7_1-ibm-1.7.1_sr4.20-38.16.1
java-1_7_1-ibm-jdbc-1.7.1_sr4.20-38.16.1
- SUSE Linux Enterprise Server 12-SP3 (x86_64):
java-1_7_1-ibm-alsa-1.7.1_sr4.20-38.16.1
java-1_7_1-ibm-plugin-1.7.1_sr4.20-38.16.1
- SUSE Linux Enterprise Server 12-SP2 (ppc64le s390x x86_64):
java-1_7_1-ibm-1.7.1_sr4.20-38.16.1
java-1_7_1-ibm-jdbc-1.7.1_sr4.20-38.16.1
- SUSE Linux Enterprise Server 12-SP2 (x86_64):
java-1_7_1-ibm-alsa-1.7.1_sr4.20-38.16.1
java-1_7_1-ibm-plugin-1.7.1_sr4.20-38.16.1
- SUSE Linux Enterprise Server 12-SP1-LTSS (ppc64le s390x x86_64):
java-1_7_1-ibm-1.7.1_sr4.20-38.16.1
java-1_7_1-ibm-devel-1.7.1_sr4.20-38.16.1
java-1_7_1-ibm-jdbc-1.7.1_sr4.20-38.16.1
- SUSE Linux Enterprise Server 12-SP1-LTSS (x86_64):
java-1_7_1-ibm-alsa-1.7.1_sr4.20-38.16.1
java-1_7_1-ibm-plugin-1.7.1_sr4.20-38.16.1
- SUSE Linux Enterprise Server 12-LTSS (ppc64le s390x x86_64):
java-1_7_1-ibm-1.7.1_sr4.20-38.16.1
java-1_7_1-ibm-devel-1.7.1_sr4.20-38.16.1
java-1_7_1-ibm-jdbc-1.7.1_sr4.20-38.16.1
- SUSE Linux Enterprise Server 12-LTSS (x86_64):
java-1_7_1-ibm-alsa-1.7.1_sr4.20-38.16.1
java-1_7_1-ibm-plugin-1.7.1_sr4.20-38.16.1
References:
https://www.suse.com/security/cve/CVE-2018-2579.html
https://www.suse.com/security/cve/CVE-2018-2582.html
https://www.suse.com/security/cve/CVE-2018-2588.html
https://www.suse.com/security/cve/CVE-2018-2599.html
https://www.suse.com/security/cve/CVE-2018-2602.html
https://www.suse.com/security/cve/CVE-2018-2603.html
https://www.suse.com/security/cve/CVE-2018-2618.html
https://www.suse.com/security/cve/CVE-2018-2633.html
https://www.suse.com/security/cve/CVE-2018-2634.html
https://www.suse.com/security/cve/CVE-2018-2637.html
https://www.suse.com/security/cve/CVE-2018-2641.html
https://www.suse.com/security/cve/CVE-2018-2657.html
https://www.suse.com/security/cve/CVE-2018-2663.html
https://www.suse.com/security/cve/CVE-2018-2677.html
https://www.suse.com/security/cve/CVE-2018-2678.html
https://bugzilla.suse.com/1057460
https://bugzilla.suse.com/1076390
https://bugzilla.suse.com/1082810
https://bugzilla.suse.com/1085018
https://bugzilla.suse.com/929900
https://bugzilla.suse.com/955131
https://bugzilla.suse.com/966304
More information about the sle-updates
mailing list