SUSE-SU-2018:4064-2: important: Security update for java-1_8_0-ibm
sle-updates at lists.suse.com
sle-updates at lists.suse.com
Sat Apr 27 16:37:33 MDT 2019
SUSE Security Update: Security update for java-1_8_0-ibm
______________________________________________________________________________
Announcement ID: SUSE-SU-2018:4064-2
Rating: important
References: #1116574
Cross-References: CVE-2018-13785 CVE-2018-3136 CVE-2018-3139
CVE-2018-3149 CVE-2018-3169 CVE-2018-3180
CVE-2018-3183 CVE-2018-3214
Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP1
______________________________________________________________________________
An update that fixes 8 vulnerabilities is now available.
Description:
java-1_8_0-ibm was updated to Java 8.0 Service Refresh 5 Fix Pack 25
(bsc#1116574)
* Class Libraries:
- IJ10934 CVE-2018-13785
- IJ10935 CVE-2018-3136
- IJ10895 CVE-2018-3139
- IJ10932 CVE-2018-3149
- IJ10894 CVE-2018-3180
- IJ10930 CVE-2018-3183
- IJ10933 CVE-2018-3214
- IJ09315 FLOATING POINT EXCEPTION FROM JAVA.TEXT.DECIMALFORMAT. FORMAT
- IJ09088 INTRODUCING A NEW PROPERTY FOR TURKEY TIMEZONE FOR PRODUCTS
NOT IDENTIFYING TRT
- IJ10800 REMOVE EXPIRING ROOT CERTIFICATES IN IBM JDKâS CACERTS.
- IJ10566 SUPPORT EBCDIC CODE PAGE IBM-274 â BELGIUM EBCDIC
* Java Virtual Machine
- IJ08730 APPLICATION SIGNAL HANDLER NOT INVOKED FOR SIGABRT
- IJ10453 ASSERTION FAILURE AT CLASSPATHITEM.CPP
- IJ09574 CLASSLOADER DEFINED THROUGH SYSTEM PROPERTY
âJAVA.SYSTEM.CLASS.LOADE Râ IS NOT HONORED.
- IJ10931 CVE-2018-3169
- IJ10618 GPU SORT: UNSPECIFIED LAUNCH FAILURE
- IJ10619 INCORRECT ILLEGALARGUMENTEXCEPTION BECAUSE OBJECT IS NOT AN
INSTANCE OF DECLARING CLASS ON REFLECTIVE INVOCATION
- IJ10135 JVM HUNG IN GARBAGECOLLECTORMXBEAN.G ETLASTGCINFO() API
- IJ10680 RECURRENT ABORTED SCAVENGE
* ORB
- IX90187 CLIENTREQUESTIMPL.REINVO KE FAILS WITH
JAVA.LANG.INDEXOUTOFBOUN DSEXCEPTION
* Reliability and Serviceability
- IJ09600 DTFJ AND JDMPVIEW FAIL TO PARSE WIDE REGISTER VALUES
* Security
- IJ10492 'EC KEYSIZE < 384' IS NOT HONORED USING THE
'JDK.TLS.DISABLEDALGORIT HMS' SECURITY PROPERTY
- IJ10310 ADD NULL CHECKING ON THE ENCRYPTION TYPES LIST TO
CREDENTIALS.GETDEFAULTNA TIVECREDS() METHOD
- IJ10491 AES/GCM CIPHER â AAD NOT RESET TO UN-INIT STATE AFTER
DOFINAL( ) AND INIT( )
- IJ08442 HTTP PUBLIC KEY PINNING FINGERPRINT,PROBLEM WITH CONVERTING TO
JKS KEYSTORE
- IJ09107 IBMPKCS11IMPL CRYPTO PROVIDER â INTERMITTENT ERROR WITH
SECP521R1 SIGNATURE ON Z/OS
- IJ10136 IBMPKCS11IMPL â INTERMITTENT ERROR WITH SECP521R1 SIG ON
Z/OS AND Z/LINUX
- IJ08530 IBMPKCS11IMPL PROVIDER USES THE WRONG RSA CIPHER MECHANISM FOR
THE RSA/ECB/PKCS1PADDING CIPHER
- IJ08723 JAAS THROWS A âARRAY INDEX OUT OF RANGEâ EXCEPTION
- IJ08704 THE SECURITY PROPERTY âJDK.CERTPATH.DISABLEDAL GORITHMSâ
IS MISTAKENLY BEING USED TO FILTER JAR SIGNING ALGORITHMS
* z/OS Extentions
- PH03889 ADD SUPPORT FOR TRY-WITH-RESOURCES TO COM.IBM.JZOS.ENQUEUE
- PH03414 ROLLOVER FROM SYE TO SAE FOR ICSF REASON CODE 3059
- PH04008 ZERTJSSE â Z SYSTEMS ENCRYPTION READINESS TOOL (ZERT) NEW
SUPPORT IN THE Z/OS JAVA SDK
This includes the update to Java 8.0 Service Refresh 5 Fix Pack 22:
* Java Virtual Machine
- IJ09139 CUDA4J NOT AVAILABLE ON ALL PLATFORMS
* JIT Compiler
- IJ09089 CRASH DURING COMPILATION IN USEREGISTER ON X86-32
- IJ08655 FLOATING POINT ERROR (SIGFPE) IN ZJ9SYM1 OR ANY VM/JIT MODULE
ON AN INSTRUCTION FOLLOWING A VECTOR INSTRUCTION
- IJ08850 CRASH IN ARRAYLIST$ITR.NEXT()
- IJ09601 JVM CRASHES ON A SIGBUS SIGNAL WHEN ACCESSING A
DIRECTBYTEBUFFER
* z/OS Extentions
- PH02999 JZOS data management classes accept dataset names in code
pages supported by z/OS system services
- PH01244 OUTPUT BUFFER TOO SHORT FOR GCM MODE ENCRYPTION USING
IBMJCEHYBRID
Also the update to Java 8.0 Service Refresh 5 Fix Pack 21
* Class Libraries
- IJ08569 JAVA.IO.IOEXCEPTION OCCURS WHEN A FILECHANNEL IS BIGGER THAN
2GB ON AIX PLATFORM
- IJ08570 JAVA.LANG.UNSATISFIEDLIN KERROR WITH JAVA OPTION
-DSUN.JAVA2D.CMM=SUN.JAV A2D.CMM.KCMS.KCMSSERVICE PROVIDER ON AIX
PLATFORM
* Java Virtual Machine
- IJ08001 30% THROUGHPUT DROP FOR CERTAIN SYNCHRONIZATION WORKLOADS
- IJ07997 TRACEASSERT IN GARBAGE COLLECTOR(MEMORYSUBSPACE)
* JIT Compiler
- IJ08503 ASSERTION IS HIT DUE TO UNEXPECTED STACK HEIGHT IN DEBUGGING
MODE
- IJ08375 CRASH DURING HARDWARE GENERATED GUARDED STORAGE EVENT WITHIN A
TRANSACTIONAL EXECUTION REGION WHEN RUNNING WITH -XGC:CONCURRENTS
- IJ08205 CRASH WHILE COMPILING
- IJ09575 INCORRECT RESULT WHEN USING JAVA.LANG.MATH.MIN OR MAX ON
31-BIT JVM
- IJ07886 INCORRECT CALUCATIONS WHEN USING NUMBERFORMAT.FORMAT() AND
BIGDECIMAL.{FLOAT/DOUBLE }VALUE()
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server for SAP 12-SP1:
zypper in -t patch SUSE-SLE-SAP-12-SP1-2019-1072=1
Package List:
- SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64):
java-1_8_0-ibm-1.8.0_sr5.25-30.39.1
java-1_8_0-ibm-alsa-1.8.0_sr5.25-30.39.1
java-1_8_0-ibm-devel-1.8.0_sr5.25-30.39.1
java-1_8_0-ibm-plugin-1.8.0_sr5.25-30.39.1
References:
https://www.suse.com/security/cve/CVE-2018-13785.html
https://www.suse.com/security/cve/CVE-2018-3136.html
https://www.suse.com/security/cve/CVE-2018-3139.html
https://www.suse.com/security/cve/CVE-2018-3149.html
https://www.suse.com/security/cve/CVE-2018-3169.html
https://www.suse.com/security/cve/CVE-2018-3180.html
https://www.suse.com/security/cve/CVE-2018-3183.html
https://www.suse.com/security/cve/CVE-2018-3214.html
https://bugzilla.suse.com/1116574
More information about the sle-updates
mailing list