Security update for java-1_7_1-ibm
Announcement ID: | SUSE-SU-2018:3933-2 |
---|---|
Rating: | important |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves seven vulnerabilities can now be installed.
Description:
java-1_7_1-ibm was updated to Java 7.1 Service Refresh 4 Fix Pack 35 (bsc#1116574):
-
Consumability
-
IJ10515 AIX JAVA 7.1.3.10 GENERAL PROTECTION FAULT WHEN ATTEMPTING TO USE HEALTH CENTER API
-
Class Libraries
-
IJ10934 CVE-2018-13785
- IJ10935 CVE-2018-3136
- IJ10895 CVE-2018-3139
- IJ10932 CVE-2018-3149
- IJ10894 CVE-2018-3180
- IJ10933 CVE-2018-3214
- IJ09315 FLOATING POINT EXCEPTION FROM JAVA.TEXT.DECIMALFORMAT. FORMAT
- IJ09088 INTRODUCING A NEW PROPERTY FOR TURKEY TIMEZONE FOR PRODUCTS NOT IDENTIFYING TRT
- IJ08569 JAVA.IO.IOEXCEPTION OCCURS WHEN A FILECHANNEL IS BIGGER THAN 2GB ON AIX PLATFORM
-
IJ10800 REMOVE EXPIRING ROOT CERTIFICATES IN IBM JDK’S CACERTS.
-
Java Virtual Machine
-
IJ10931 CVE-2018-3169
-
IV91132 SOME CORE PATTERN SPECIFIERS ARE NOT HANDLED BY THE JVM ON LINUX
-
JIT Compiler
-
IJ08205 CRASH WHILE COMPILING
-
IJ07886 INCORRECT CALUCATIONS WHEN USING NUMBERFORMAT.FORMAT() AND BIGDECIMAL.{FLOAT/DOUBLE }VALUE()
-
ORB
-
IX90187 CLIENTREQUESTIMPL.REINVO KE FAILS WITH JAVA.LANG.INDEXOUTOFBOUN DSEXCEPTION
-
Security
-
IJ10492 'EC KEYSIZE < 384' IS NOT HONORED USING THE 'JDK.TLS.DISABLEDALGORIT HMS' SECURITY PROPERTY
- IJ10491 AES/GCM CIPHER – AAD NOT RESET TO UN-INIT STATE AFTER DOFINAL( ) AND INIT( )
- IJ08442 HTTP PUBLIC KEY PINNING FINGERPRINT,PROBLEM WITH CONVERTING TO JKS KEYSTORE
- IJ09107 IBMPKCS11IMPL CRYPTO PROVIDER – INTERMITTENT ERROR WITH SECP521R1 SIGNATURE ON Z/OS
- IJ10136 IBMPKCS11IMPL – INTERMITTENT ERROR WITH SECP521R1 SIG ON Z/OS AND Z/LINUX
- IJ08530 IBMPKCS11IMPL PROVIDER USES THE WRONG RSA CIPHER MECHANISM FOR THE RSA/ECB/PKCS1PADDING CIPHER
- IJ08723 JAAS THROWS A ‘ARRAY INDEX OUT OF RANGE’ EXCEPTION
-
IJ08704 THE SECURITY PROPERTY ‘JDK.CERTPATH.DISABLEDAL GORITHMS’ IS MISTAKENLY BEING USED TO FILTER JAR SIGNING ALGORITHMS
-
z/OS Extentions
-
PH01244 OUTPUT BUFFER TOO SHORT FOR GCM MODE ENCRYPTION USING IBMJCEHYBRID
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Server for SAP Applications 12 SP1
zypper in -t patch SUSE-SLE-SAP-12-SP1-2019-1068=1
Package List:
-
SUSE Linux Enterprise Server for SAP Applications 12 SP1 (nosrc x86_64)
- java-1_7_1-ibm-1.7.1_sr4.35-38.29.1
-
SUSE Linux Enterprise Server for SAP Applications 12 SP1 (x86_64)
- java-1_7_1-ibm-plugin-1.7.1_sr4.35-38.29.1
- java-1_7_1-ibm-alsa-1.7.1_sr4.35-38.29.1
- java-1_7_1-ibm-devel-1.7.1_sr4.35-38.29.1
- java-1_7_1-ibm-jdbc-1.7.1_sr4.35-38.29.1
References:
- https://www.suse.com/security/cve/CVE-2018-13785.html
- https://www.suse.com/security/cve/CVE-2018-3136.html
- https://www.suse.com/security/cve/CVE-2018-3139.html
- https://www.suse.com/security/cve/CVE-2018-3149.html
- https://www.suse.com/security/cve/CVE-2018-3169.html
- https://www.suse.com/security/cve/CVE-2018-3180.html
- https://www.suse.com/security/cve/CVE-2018-3214.html
- https://bugzilla.suse.com/show_bug.cgi?id=1116574