SUSE-SU-2018:4064-2: important: Security update for java-1_8_0-ibm

sle-updates at lists.suse.com sle-updates at lists.suse.com
Sat Apr 27 16:37:33 MDT 2019


   SUSE Security Update: Security update for java-1_8_0-ibm
______________________________________________________________________________

Announcement ID:    SUSE-SU-2018:4064-2
Rating:             important
References:         #1116574 
Cross-References:   CVE-2018-13785 CVE-2018-3136 CVE-2018-3139
                    CVE-2018-3149 CVE-2018-3169 CVE-2018-3180
                    CVE-2018-3183 CVE-2018-3214
Affected Products:
                    SUSE Linux Enterprise Server for SAP 12-SP1
______________________________________________________________________________

   An update that fixes 8 vulnerabilities is now available.

Description:


   java-1_8_0-ibm was updated to Java 8.0 Service Refresh 5 Fix Pack 25
   (bsc#1116574)

   * Class Libraries:

     - IJ10934 CVE-2018-13785
     - IJ10935 CVE-2018-3136
     - IJ10895 CVE-2018-3139
     - IJ10932 CVE-2018-3149
     - IJ10894 CVE-2018-3180
     - IJ10930 CVE-2018-3183
     - IJ10933 CVE-2018-3214
     - IJ09315 FLOATING POINT EXCEPTION FROM JAVA.TEXT.DECIMALFORMAT. FORMAT
     - IJ09088 INTRODUCING A NEW PROPERTY FOR TURKEY TIMEZONE FOR PRODUCTS
       NOT IDENTIFYING TRT
     - IJ10800 REMOVE EXPIRING ROOT CERTIFICATES IN IBM JDK’S CACERTS.
     - IJ10566 SUPPORT EBCDIC CODE PAGE IBM-274 – BELGIUM EBCDIC

   * Java Virtual Machine

     - IJ08730 APPLICATION SIGNAL HANDLER NOT INVOKED FOR SIGABRT
     - IJ10453 ASSERTION FAILURE AT CLASSPATHITEM.CPP
     - IJ09574 CLASSLOADER DEFINED THROUGH SYSTEM PROPERTY
       ‘JAVA.SYSTEM.CLASS.LOADE R’ IS NOT HONORED.
     - IJ10931 CVE-2018-3169
     - IJ10618 GPU SORT: UNSPECIFIED LAUNCH FAILURE
     - IJ10619 INCORRECT ILLEGALARGUMENTEXCEPTION BECAUSE OBJECT IS NOT AN
       INSTANCE OF DECLARING CLASS ON REFLECTIVE INVOCATION
     - IJ10135 JVM HUNG IN GARBAGECOLLECTORMXBEAN.G ETLASTGCINFO() API
     - IJ10680 RECURRENT ABORTED SCAVENGE

   * ORB

     - IX90187 CLIENTREQUESTIMPL.REINVO KE FAILS WITH
       JAVA.LANG.INDEXOUTOFBOUN DSEXCEPTION

   * Reliability and Serviceability

     - IJ09600 DTFJ AND JDMPVIEW FAIL TO PARSE WIDE REGISTER VALUES

   * Security

     - IJ10492 'EC KEYSIZE < 384' IS NOT HONORED USING THE
       'JDK.TLS.DISABLEDALGORIT HMS' SECURITY PROPERTY
     - IJ10310 ADD NULL CHECKING ON THE ENCRYPTION TYPES LIST TO
       CREDENTIALS.GETDEFAULTNA TIVECREDS() METHOD
     - IJ10491 AES/GCM CIPHER – AAD NOT RESET TO UN-INIT STATE AFTER
       DOFINAL( ) AND INIT( )
     - IJ08442 HTTP PUBLIC KEY PINNING FINGERPRINT,PROBLEM WITH CONVERTING TO
       JKS KEYSTORE
     - IJ09107 IBMPKCS11IMPL CRYPTO PROVIDER – INTERMITTENT ERROR WITH
       SECP521R1 SIGNATURE ON Z/OS
     - IJ10136 IBMPKCS11IMPL – INTERMITTENT ERROR WITH SECP521R1 SIG ON
       Z/OS AND Z/LINUX
     - IJ08530 IBMPKCS11IMPL PROVIDER USES THE WRONG RSA CIPHER MECHANISM FOR
       THE RSA/ECB/PKCS1PADDING CIPHER
     - IJ08723 JAAS THROWS A ‘ARRAY INDEX OUT OF RANGE’ EXCEPTION
     - IJ08704 THE SECURITY PROPERTY ‘JDK.CERTPATH.DISABLEDAL GORITHMS’
       IS MISTAKENLY BEING USED TO FILTER JAR SIGNING ALGORITHMS

   * z/OS Extentions

     - PH03889 ADD SUPPORT FOR TRY-WITH-RESOURCES TO COM.IBM.JZOS.ENQUEUE
     - PH03414 ROLLOVER FROM SYE TO SAE FOR ICSF REASON CODE 3059
     - PH04008 ZERTJSSE – Z SYSTEMS ENCRYPTION READINESS TOOL (ZERT) NEW
       SUPPORT IN THE Z/OS JAVA SDK

   This includes the update to Java 8.0 Service Refresh 5 Fix Pack 22:

   * Java Virtual Machine

     - IJ09139 CUDA4J NOT AVAILABLE ON ALL PLATFORMS

   * JIT Compiler

     - IJ09089 CRASH DURING COMPILATION IN USEREGISTER ON X86-32
     - IJ08655 FLOATING POINT ERROR (SIGFPE) IN ZJ9SYM1 OR ANY VM/JIT MODULE
       ON AN INSTRUCTION FOLLOWING A VECTOR INSTRUCTION
     - IJ08850 CRASH IN ARRAYLIST$ITR.NEXT()
     - IJ09601 JVM CRASHES ON A SIGBUS SIGNAL WHEN ACCESSING A
       DIRECTBYTEBUFFER

   * z/OS Extentions

     - PH02999 JZOS data management classes accept dataset names in code
       pages supported by z/OS system services
     - PH01244 OUTPUT BUFFER TOO SHORT FOR GCM MODE ENCRYPTION USING
       IBMJCEHYBRID

   Also the update to Java 8.0 Service Refresh 5 Fix Pack 21

   * Class Libraries

     - IJ08569 JAVA.IO.IOEXCEPTION OCCURS WHEN A FILECHANNEL IS BIGGER THAN
       2GB ON AIX PLATFORM
     - IJ08570 JAVA.LANG.UNSATISFIEDLIN KERROR WITH JAVA OPTION
       -DSUN.JAVA2D.CMM=SUN.JAV A2D.CMM.KCMS.KCMSSERVICE PROVIDER ON AIX
       PLATFORM

   * Java Virtual Machine

     - IJ08001 30% THROUGHPUT DROP FOR CERTAIN SYNCHRONIZATION WORKLOADS
     - IJ07997 TRACEASSERT IN GARBAGE COLLECTOR(MEMORYSUBSPACE)

   * JIT Compiler

     - IJ08503 ASSERTION IS HIT DUE TO UNEXPECTED STACK HEIGHT IN DEBUGGING
       MODE
     - IJ08375 CRASH DURING HARDWARE GENERATED GUARDED STORAGE EVENT WITHIN A
       TRANSACTIONAL EXECUTION REGION WHEN RUNNING WITH -XGC:CONCURRENTS
     - IJ08205 CRASH WHILE COMPILING
     - IJ09575 INCORRECT RESULT WHEN USING JAVA.LANG.MATH.MIN OR MAX ON
       31-BIT JVM
     - IJ07886 INCORRECT CALUCATIONS WHEN USING NUMBERFORMAT.FORMAT() AND
       BIGDECIMAL.{FLOAT/DOUBLE }VALUE()


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Server for SAP 12-SP1:

      zypper in -t patch SUSE-SLE-SAP-12-SP1-2019-1072=1



Package List:

   - SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64):

      java-1_8_0-ibm-1.8.0_sr5.25-30.39.1
      java-1_8_0-ibm-alsa-1.8.0_sr5.25-30.39.1
      java-1_8_0-ibm-devel-1.8.0_sr5.25-30.39.1
      java-1_8_0-ibm-plugin-1.8.0_sr5.25-30.39.1


References:

   https://www.suse.com/security/cve/CVE-2018-13785.html
   https://www.suse.com/security/cve/CVE-2018-3136.html
   https://www.suse.com/security/cve/CVE-2018-3139.html
   https://www.suse.com/security/cve/CVE-2018-3149.html
   https://www.suse.com/security/cve/CVE-2018-3169.html
   https://www.suse.com/security/cve/CVE-2018-3180.html
   https://www.suse.com/security/cve/CVE-2018-3183.html
   https://www.suse.com/security/cve/CVE-2018-3214.html
   https://bugzilla.suse.com/1116574



More information about the sle-updates mailing list