SUSE: 2022:4290-1 moderate: java-1_8_0-ibm | LinuxSecurity.com

   SUSE Security Update: Security update for java-1_8_0-ibm
______________________________________________________________________________

Announcement ID:    SUSE-SU-2022:4290-1
Rating:             moderate
References:         #1204468 #1204471 #1204472 #1204473 #1204475 
                    #1204480 #1205302 
Cross-References:   CVE-2022-21618 CVE-2022-21619 CVE-2022-21624
                    CVE-2022-21626 CVE-2022-21628 CVE-2022-39399
                   
CVSS scores:
                    CVE-2022-21618 (NVD) : 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
                    CVE-2022-21618 (SUSE): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
                    CVE-2022-21619 (NVD) : 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
                    CVE-2022-21619 (SUSE): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
                    CVE-2022-21624 (NVD) : 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
                    CVE-2022-21624 (SUSE): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
                    CVE-2022-21626 (NVD) : 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
                    CVE-2022-21626 (SUSE): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
                    CVE-2022-21628 (NVD) : 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
                    CVE-2022-21628 (SUSE): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
                    CVE-2022-39399 (NVD) : 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
                    CVE-2022-39399 (SUSE): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

Affected Products:
                    SUSE Linux Enterprise Server 12-SP2-BCL
                    SUSE Linux Enterprise Server 12-SP3-BCL
                    SUSE Linux Enterprise Server 12-SP4-LTSS
                    SUSE Linux Enterprise Server 12-SP5
                    SUSE Linux Enterprise Server for SAP 12-SP4
                    SUSE Linux Enterprise Server for SAP Applications 12-SP5
                    SUSE Linux Enterprise Software Development Kit 12-SP5
                    SUSE OpenStack Cloud 9
                    SUSE OpenStack Cloud Crowbar 9
______________________________________________________________________________

   An update that solves 6 vulnerabilities and has one errata
   is now available.

Description:

   This update for java-1_8_0-ibm fixes the following issues:

   - CVE-2022-21626: An unauthenticated attacker with network access via
     HTTPS can compromise Oracle Java SE, Oracle GraalVM Enterprise Edition
     (bsc#1204471).
   - CVE-2022-21618: An unauthenticated attacker with network access via
     Kerberos can compromise Oracle Java SE, Oracle GraalVM Enterprise
     Edition (bsc#1204468).
   - CVE-2022-21619: An unauthenticated attacker with network access via
     multiple protocols to compromise Oracle Java SE (bsc#1204473).
   - CVE-2022-21628: An unauthenticated attacker with network access via HTTP
     can compromise Oracle Java SE, Oracle GraalVM Enterprise Edition
     (bsc#1204472).
   - CVE-2022-21624: An unauthenticated attacker with network access via
     multiple protocols to compromise Oracle Java SE, Oracle GraalVM
     Enterprise (bsc#1204475).
   - CVE-2022-39399: An unauthenticated attacker with network access via HTTP
     can compromise Oracle Java SE, Oracle GraalVM Enterprise Edition
     (bsc#1204480).

   - Update to Java 8.0 Service Refresh 7 Fix Pack 20 [bsc#1205302]
     * Security:
       - The IBM ORB Does Not Support Object-Serialisation Data Filtering
       - Large Allocation In CipherSuite
       - Avoid Evaluating Sslalgorithmconstraints Twice
       - Cache The Results Of Constraint Checks
       - An incorrect ShortBufferException is thrown by IBMJCEPlus,
         IBMJCEPlusFIPS during cipher update operation
       - Disable SHA-1 Signed Jars For Ea
       - JSSE Performance Improvement
       - Oracle Road Map Kerberos Deprecation Of 3DES And RC4 Encryption
     * Java 8/Orb:
       - Upgrade ibmcfw.jar To Version o2228.02
     * Class Libraries:
       - Crash In Libjsor.So During An Rdma Failover
       - High CPU Consumption Observed In ZosEventPort$EventHandlerTask.run
       - Update Timezone Information To The Latest tzdata2022c
     * Jit Compiler:
       - Crash During JIT Compilation
       - Incorrect JIT Optimization Of Java Code
       - Incorrect Return From Class.isArray()
       - Unexpected ClassCastException
       - Performance Regression When Calling VM Helper Code On X86
     * X/Os Extentions:
       - Add RSA-OAEP Cipher Function To IBMJCECCA

   - Update to Java 8.0 Service Refresh 7 Fix Pack 16
     * Java Virtual Machine
       - Assertion failure at ClassLoaderRememberedSet.cpp
   	- Assertion failure at StandardAccessBarrier.cpp when
   	  -Xgc:concurrentScavenge is set.
       - GC can have unflushed ownable synchronizer objects which can
         eventually lead to heap corruption and failure when
   	  -Xgc:concurrentScavenge is set.
     *	JIT Compiler:
       - Incorrect JIT optimization of Java code
       - JAVA JIT Power: JIT compile time assert on AIX or LINUXPPC
     *	Reliability and Serviceability:
       - javacore with "kill -3" SIGQUIT signal freezes Java process


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE OpenStack Cloud Crowbar 9:

      zypper in -t patch SUSE-OpenStack-Cloud-Crowbar-9-2022-4290=1

   - SUSE OpenStack Cloud 9:

      zypper in -t patch SUSE-OpenStack-Cloud-9-2022-4290=1

   - SUSE Linux Enterprise Software Development Kit 12-SP5:

      zypper in -t patch SUSE-SLE-SDK-12-SP5-2022-4290=1

   - SUSE Linux Enterprise Server for SAP 12-SP4:

      zypper in -t patch SUSE-SLE-SAP-12-SP4-2022-4290=1

   - SUSE Linux Enterprise Server 12-SP5:

      zypper in -t patch SUSE-SLE-SERVER-12-SP5-2022-4290=1

   - SUSE Linux Enterprise Server 12-SP4-LTSS:

      zypper in -t patch SUSE-SLE-SERVER-12-SP4-LTSS-2022-4290=1

   - SUSE Linux Enterprise Server 12-SP3-BCL:

      zypper in -t patch SUSE-SLE-SERVER-12-SP3-BCL-2022-4290=1

   - SUSE Linux Enterprise Server 12-SP2-BCL:

      zypper in -t patch SUSE-SLE-SERVER-12-SP2-BCL-2022-4290=1



Package List:

   - SUSE OpenStack Cloud Crowbar 9 (x86_64):

      java-1_8_0-ibm-1.8.0_sr7.20-30.99.1
      java-1_8_0-ibm-alsa-1.8.0_sr7.20-30.99.1
      java-1_8_0-ibm-devel-1.8.0_sr7.20-30.99.1
      java-1_8_0-ibm-plugin-1.8.0_sr7.20-30.99.1

   - SUSE OpenStack Cloud 9 (x86_64):

      java-1_8_0-ibm-1.8.0_sr7.20-30.99.1
      java-1_8_0-ibm-alsa-1.8.0_sr7.20-30.99.1
      java-1_8_0-ibm-devel-1.8.0_sr7.20-30.99.1
      java-1_8_0-ibm-plugin-1.8.0_sr7.20-30.99.1

   - SUSE Linux Enterprise Software Development Kit 12-SP5 (ppc64le s390x x86_64):

      java-1_8_0-ibm-devel-1.8.0_sr7.20-30.99.1

   - SUSE Linux Enterprise Server for SAP 12-SP4 (ppc64le x86_64):

      java-1_8_0-ibm-1.8.0_sr7.20-30.99.1
      java-1_8_0-ibm-devel-1.8.0_sr7.20-30.99.1

   - SUSE Linux Enterprise Server for SAP 12-SP4 (x86_64):

      java-1_8_0-ibm-alsa-1.8.0_sr7.20-30.99.1
      java-1_8_0-ibm-plugin-1.8.0_sr7.20-30.99.1

   - SUSE Linux Enterprise Server 12-SP5 (ppc64le s390x x86_64):

      java-1_8_0-ibm-1.8.0_sr7.20-30.99.1
      java-1_8_0-ibm-devel-1.8.0_sr7.20-30.99.1

   - SUSE Linux Enterprise Server 12-SP5 (x86_64):

      java-1_8_0-ibm-alsa-1.8.0_sr7.20-30.99.1
      java-1_8_0-ibm-plugin-1.8.0_sr7.20-30.99.1

   - SUSE Linux Enterprise Server 12-SP4-LTSS (ppc64le s390x x86_64):

      java-1_8_0-ibm-1.8.0_sr7.20-30.99.1
      java-1_8_0-ibm-devel-1.8.0_sr7.20-30.99.1

   - SUSE Linux Enterprise Server 12-SP4-LTSS (x86_64):

      java-1_8_0-ibm-alsa-1.8.0_sr7.20-30.99.1
      java-1_8_0-ibm-plugin-1.8.0_sr7.20-30.99.1

   - SUSE Linux Enterprise Server 12-SP3-BCL (x86_64):

      java-1_8_0-ibm-1.8.0_sr7.20-30.99.1
      java-1_8_0-ibm-alsa-1.8.0_sr7.20-30.99.1
      java-1_8_0-ibm-devel-1.8.0_sr7.20-30.99.1
      java-1_8_0-ibm-plugin-1.8.0_sr7.20-30.99.1

   - SUSE Linux Enterprise Server 12-SP2-BCL (x86_64):

      java-1_8_0-ibm-1.8.0_sr7.20-30.99.1
      java-1_8_0-ibm-alsa-1.8.0_sr7.20-30.99.1
      java-1_8_0-ibm-devel-1.8.0_sr7.20-30.99.1
      java-1_8_0-ibm-plugin-1.8.0_sr7.20-30.99.1


References:

   https://www.suse.com/security/cve/CVE-2022-21618.html
   https://www.suse.com/security/cve/CVE-2022-21619.html
   https://www.suse.com/security/cve/CVE-2022-21624.html
   https://www.suse.com/security/cve/CVE-2022-21626.html
   https://www.suse.com/security/cve/CVE-2022-21628.html
   https://www.suse.com/security/cve/CVE-2022-39399.html
   https://bugzilla.suse.com/1204468
   https://bugzilla.suse.com/1204471
   https://bugzilla.suse.com/1204472
   https://bugzilla.suse.com/1204473
   https://bugzilla.suse.com/1204475
   https://bugzilla.suse.com/1204480
   https://bugzilla.suse.com/1205302

SUSE: 2022:4290-1 moderate: java-1_8_0-ibm

November 29, 2022
An update that solves 6 vulnerabilities and has one errata is now available

Summary

This update for java-1_8_0-ibm fixes the following issues: - CVE-2022-21626: An unauthenticated attacker with network access via HTTPS can compromise Oracle Java SE, Oracle GraalVM Enterprise Edition (bsc#1204471). - CVE-2022-21618: An unauthenticated attacker with network access via Kerberos can compromise Oracle Java SE, Oracle GraalVM Enterprise Edition (bsc#1204468). - CVE-2022-21619: An unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE (bsc#1204473). - CVE-2022-21628: An unauthenticated attacker with network access via HTTP can compromise Oracle Java SE, Oracle GraalVM Enterprise Edition (bsc#1204472). - CVE-2022-21624: An unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise (bsc#1204475). - CVE-2022-39399: An unauthenticated attacker with network access via HTTP can compromise Oracle Java SE, Oracle GraalVM Enterprise Edition (bsc#1204480). - Update to Java 8.0 Service Refresh 7 Fix Pack 20 [bsc#1205302] * Security: - The IBM ORB Does Not Support Object-Serialisation Data Filtering - Large Allocation In CipherSuite - Avoid Evaluating Sslalgorithmconstraints Twice - Cache The Results Of Constraint Checks - An incorrect ShortBufferException is thrown by IBMJCEPlus, IBMJCEPlusFIPS during cipher update operation - Disable SHA-1 Signed Jars For Ea - JSSE Performance Improvement - Oracle Road Map Kerberos Deprecation Of 3DES And RC4 Encryption * Java 8/Orb: - Upgrade ibmcfw.jar To Version o2228.02 * Class Libraries: - Crash In Libjsor.So During An Rdma Failover - High CPU Consumption Observed In ZosEventPort$EventHandlerTask.run - Update Timezone Information To The Latest tzdata2022c * Jit Compiler: - Crash During JIT Compilation - Incorrect JIT Optimization Of Java Code - Incorrect Return From Class.isArray() - Unexpected ClassCastException - Performance Regression When Calling VM Helper Code On X86 * X/Os Extentions: - Add RSA-OAEP Cipher Function To IBMJCECCA - Update to Java 8.0 Service Refresh 7 Fix Pack 16 * Java Virtual Machine - Assertion failure at ClassLoaderRememberedSet.cpp - Assertion failure at StandardAccessBarrier.cpp when -Xgc:concurrentScavenge is set. - GC can have unflushed ownable synchronizer objects which can eventually lead to heap corruption and failure when -Xgc:concurrentScavenge is set. * JIT Compiler: - Incorrect JIT optimization of Java code - JAVA JIT Power: JIT compile time assert on AIX or LINUXPPC * Reliability and Serviceability: - javacore with "kill -3" SIGQUIT signal freezes Java process Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE OpenStack Cloud Crowbar 9: zypper in -t patch SUSE-OpenStack-Cloud-Crowbar-9-2022-4290=1 - SUSE OpenStack Cloud 9: zypper in -t patch SUSE-OpenStack-Cloud-9-2022-4290=1 - SUSE Linux Enterprise Software Development Kit 12-SP5: zypper in -t patch SUSE-SLE-SDK-12-SP5-2022-4290=1 - SUSE Linux Enterprise Server for SAP 12-SP4: zypper in -t patch SUSE-SLE-SAP-12-SP4-2022-4290=1 - SUSE Linux Enterprise Server 12-SP5: zypper in -t patch SUSE-SLE-SERVER-12-SP5-2022-4290=1 - SUSE Linux Enterprise Server 12-SP4-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-SP4-LTSS-2022-4290=1 - SUSE Linux Enterprise Server 12-SP3-BCL: zypper in -t patch SUSE-SLE-SERVER-12-SP3-BCL-2022-4290=1 - SUSE Linux Enterprise Server 12-SP2-BCL: zypper in -t patch SUSE-SLE-SERVER-12-SP2-BCL-2022-4290=1 Package List: - SUSE OpenStack Cloud Crowbar 9 (x86_64): java-1_8_0-ibm-1.8.0_sr7.20-30.99.1 java-1_8_0-ibm-alsa-1.8.0_sr7.20-30.99.1 java-1_8_0-ibm-devel-1.8.0_sr7.20-30.99.1 java-1_8_0-ibm-plugin-1.8.0_sr7.20-30.99.1 - SUSE OpenStack Cloud 9 (x86_64): java-1_8_0-ibm-1.8.0_sr7.20-30.99.1 java-1_8_0-ibm-alsa-1.8.0_sr7.20-30.99.1 java-1_8_0-ibm-devel-1.8.0_sr7.20-30.99.1 java-1_8_0-ibm-plugin-1.8.0_sr7.20-30.99.1 - SUSE Linux Enterprise Software Development Kit 12-SP5 (ppc64le s390x x86_64): java-1_8_0-ibm-devel-1.8.0_sr7.20-30.99.1 - SUSE Linux Enterprise Server for SAP 12-SP4 (ppc64le x86_64): java-1_8_0-ibm-1.8.0_sr7.20-30.99.1 java-1_8_0-ibm-devel-1.8.0_sr7.20-30.99.1 - SUSE Linux Enterprise Server for SAP 12-SP4 (x86_64): java-1_8_0-ibm-alsa-1.8.0_sr7.20-30.99.1 java-1_8_0-ibm-plugin-1.8.0_sr7.20-30.99.1 - SUSE Linux Enterprise Server 12-SP5 (ppc64le s390x x86_64): java-1_8_0-ibm-1.8.0_sr7.20-30.99.1 java-1_8_0-ibm-devel-1.8.0_sr7.20-30.99.1 - SUSE Linux Enterprise Server 12-SP5 (x86_64): java-1_8_0-ibm-alsa-1.8.0_sr7.20-30.99.1 java-1_8_0-ibm-plugin-1.8.0_sr7.20-30.99.1 - SUSE Linux Enterprise Server 12-SP4-LTSS (ppc64le s390x x86_64): java-1_8_0-ibm-1.8.0_sr7.20-30.99.1 java-1_8_0-ibm-devel-1.8.0_sr7.20-30.99.1 - SUSE Linux Enterprise Server 12-SP4-LTSS (x86_64): java-1_8_0-ibm-alsa-1.8.0_sr7.20-30.99.1 java-1_8_0-ibm-plugin-1.8.0_sr7.20-30.99.1 - SUSE Linux Enterprise Server 12-SP3-BCL (x86_64): java-1_8_0-ibm-1.8.0_sr7.20-30.99.1 java-1_8_0-ibm-alsa-1.8.0_sr7.20-30.99.1 java-1_8_0-ibm-devel-1.8.0_sr7.20-30.99.1 java-1_8_0-ibm-plugin-1.8.0_sr7.20-30.99.1 - SUSE Linux Enterprise Server 12-SP2-BCL (x86_64): java-1_8_0-ibm-1.8.0_sr7.20-30.99.1 java-1_8_0-ibm-alsa-1.8.0_sr7.20-30.99.1 java-1_8_0-ibm-devel-1.8.0_sr7.20-30.99.1 java-1_8_0-ibm-plugin-1.8.0_sr7.20-30.99.1

References

#1204468 #1204471 #1204472 #1204473 #1204475

#1204480 #1205302

Cross- CVE-2022-21618 CVE-2022-21619 CVE-2022-21624

CVE-2022-21626 CVE-2022-21628 CVE-2022-39399

CVSS scores:

CVE-2022-21618 (NVD) : 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

CVE-2022-21618 (SUSE): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

CVE-2022-21619 (NVD) : 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

CVE-2022-21619 (SUSE): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

CVE-2022-21624 (NVD) : 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

CVE-2022-21624 (SUSE): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

CVE-2022-21626 (NVD) : 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

CVE-2022-21626 (SUSE): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

CVE-2022-21628 (NVD) : 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

CVE-2022-21628 (SUSE): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

CVE-2022-39399 (NVD) : 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

CVE-2022-39399 (SUSE): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

Affected Products:

SUSE Linux Enterprise Server 12-SP2-BCL

SUSE Linux Enterprise Server 12-SP3-BCL

SUSE Linux Enterprise Server 12-SP4-LTSS

SUSE Linux Enterprise Server 12-SP5

SUSE Linux Enterprise Server for SAP 12-SP4

SUSE Linux Enterprise Server for SAP Applications 12-SP5

SUSE Linux Enterprise Software Development Kit 12-SP5

SUSE OpenStack Cloud 9

SUSE OpenStack Cloud Crowbar 9

https://www.suse.com/security/cve/CVE-2022-21618.html

https://www.suse.com/security/cve/CVE-2022-21619.html

https://www.suse.com/security/cve/CVE-2022-21624.html

https://www.suse.com/security/cve/CVE-2022-21626.html

https://www.suse.com/security/cve/CVE-2022-21628.html

https://www.suse.com/security/cve/CVE-2022-39399.html

https://bugzilla.suse.com/1204468

https://bugzilla.suse.com/1204471

https://bugzilla.suse.com/1204472

https://bugzilla.suse.com/1204473

https://bugzilla.suse.com/1204475

https://bugzilla.suse.com/1204480

https://bugzilla.suse.com/1205302

Severity
Announcement ID: SUSE-SU-2022:4290-1
Rating: moderate

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.