SUSE: 2018:3933-2 important: java-1_7_1-ibm

    Date27 Apr 2019
    CategorySuSE
    674
    Posted ByLinuxSecurity Advisories
    An update that fixes 7 vulnerabilities is now available.
    
       SUSE Security Update: Security update for java-1_7_1-ibm
    ______________________________________________________________________________
    
    Announcement ID:    SUSE-SU-2018:3933-2
    Rating:             important
    References:         #1116574 
    Cross-References:   CVE-2018-13785 CVE-2018-3136 CVE-2018-3139
                        CVE-2018-3149 CVE-2018-3169 CVE-2018-3180
                        CVE-2018-3214
    Affected Products:
                        SUSE Linux Enterprise Server for SAP 12-SP1
    ______________________________________________________________________________
    
       An update that fixes 7 vulnerabilities is now available.
    
    Description:
    
    
       java-1_7_1-ibm was updated to Java 7.1 Service Refresh 4 Fix Pack 35
       (bsc#1116574):
    
       * Consumability
    
         - IJ10515 AIX JAVA 7.1.3.10 GENERAL PROTECTION FAULT WHEN ATTEMPTING TO
           USE HEALTH CENTER API
    
       * Class Libraries
    
         - IJ10934 CVE-2018-13785
         - IJ10935 CVE-2018-3136
         - IJ10895 CVE-2018-3139
         - IJ10932 CVE-2018-3149
         - IJ10894 CVE-2018-3180
         - IJ10933 CVE-2018-3214
         - IJ09315 FLOATING POINT EXCEPTION FROM JAVA.TEXT.DECIMALFORMAT. FORMAT
         - IJ09088 INTRODUCING A NEW PROPERTY FOR TURKEY TIMEZONE FOR PRODUCTS
           NOT IDENTIFYING TRT
         - IJ08569 JAVA.IO.IOEXCEPTION OCCURS WHEN A FILECHANNEL IS BIGGER THAN
           2GB ON AIX PLATFORM
         - IJ10800 REMOVE EXPIRING ROOT CERTIFICATES IN IBM JDK’S CACERTS.
    
       * Java Virtual Machine
    
         - IJ10931 CVE-2018-3169
         - IV91132 SOME CORE PATTERN SPECIFIERS ARE NOT HANDLED BY THE JVM ON
           LINUX
    
       * JIT Compiler
    
         - IJ08205 CRASH WHILE COMPILING
         - IJ07886 INCORRECT CALUCATIONS WHEN USING NUMBERFORMAT.FORMAT() AND
           BIGDECIMAL.{FLOAT/DOUBLE }VALUE()
    
       * ORB
    
         - IX90187 CLIENTREQUESTIMPL.REINVO KE FAILS WITH
           JAVA.LANG.INDEXOUTOFBOUN DSEXCEPTION
    
       * Security
    
         - IJ10492 'EC KEYSIZE < 384' IS NOT HONORED USING THE
           'JDK.TLS.DISABLEDALGORIT HMS' SECURITY PROPERTY
         - IJ10491 AES/GCM CIPHER – AAD NOT RESET TO UN-INIT STATE AFTER
           DOFINAL( ) AND INIT( )
         - IJ08442 HTTP PUBLIC KEY PINNING FINGERPRINT,PROBLEM WITH CONVERTING TO
           JKS KEYSTORE
         - IJ09107 IBMPKCS11IMPL CRYPTO PROVIDER – INTERMITTENT ERROR WITH
           SECP521R1 SIGNATURE ON Z/OS
         - IJ10136 IBMPKCS11IMPL – INTERMITTENT ERROR WITH SECP521R1 SIG ON
           Z/OS AND Z/LINUX
         - IJ08530 IBMPKCS11IMPL PROVIDER USES THE WRONG RSA CIPHER MECHANISM FOR
           THE RSA/ECB/PKCS1PADDING CIPHER
         - IJ08723 JAAS THROWS A ‘ARRAY INDEX OUT OF RANGE’ EXCEPTION
         - IJ08704 THE SECURITY PROPERTY ‘JDK.CERTPATH.DISABLEDAL GORITHMS’
           IS MISTAKENLY BEING USED TO FILTER JAR SIGNING ALGORITHMS
    
       * z/OS Extentions
    
         - PH01244 OUTPUT BUFFER TOO SHORT FOR GCM MODE ENCRYPTION USING
           IBMJCEHYBRID
    
    
    Patch Instructions:
    
       To install this SUSE Security Update use the SUSE recommended installation methods
       like YaST online_update or "zypper patch".
    
       Alternatively you can run the command listed for your product:
    
       - SUSE Linux Enterprise Server for SAP 12-SP1:
    
          zypper in -t patch SUSE-SLE-SAP-12-SP1-2019-1068=1
    
    
    
    Package List:
    
       - SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64):
    
          java-1_7_1-ibm-1.7.1_sr4.35-38.29.1
          java-1_7_1-ibm-alsa-1.7.1_sr4.35-38.29.1
          java-1_7_1-ibm-devel-1.7.1_sr4.35-38.29.1
          java-1_7_1-ibm-jdbc-1.7.1_sr4.35-38.29.1
          java-1_7_1-ibm-plugin-1.7.1_sr4.35-38.29.1
    
    
    References:
    
       https://www.suse.com/security/cve/CVE-2018-13785.html
       https://www.suse.com/security/cve/CVE-2018-3136.html
       https://www.suse.com/security/cve/CVE-2018-3139.html
       https://www.suse.com/security/cve/CVE-2018-3149.html
       https://www.suse.com/security/cve/CVE-2018-3169.html
       https://www.suse.com/security/cve/CVE-2018-3180.html
       https://www.suse.com/security/cve/CVE-2018-3214.html
       https://bugzilla.suse.com/1116574
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"22","type":"x","order":"1","pct":55,"resources":[]},{"id":"88","title":"Should be more technical","votes":"5","type":"x","order":"2","pct":12.5,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"13","type":"x","order":"3","pct":32.5,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.