Security update for java-1_7_0-ibm
Announcement ID: | SUSE-SU-2018:0645-1 |
---|---|
Rating: | important |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves 15 vulnerabilities can now be installed.
Description:
This update for java-1_7_0-ibm provides the following fixes:
The version was updated to 7.0.10.20 [bsc#1082810]:
-
Following security issues were fixed:
-
CVE-2018-2633 CVE-2018-2637 CVE-2018-2634 CVE-2018-2582 CVE-2018-2641 CVE-2018-2618 CVE-2018-2657 CVE-2018-2603 CVE-2018-2599 CVE-2018-2602 CVE-2018-2678 CVE-2018-2677 CVE-2018-2663 CVE-2018-2588 CVE-2018-2579
-
Defect fixes:
- IJ04281 Class Libraries: Startup time increase after applying apar IV96905
- IJ03822 Class Libraries: Update timezone information to tzdata2017c
- IJ03605 Java Virtual Machine: Legacy security for com.ibm.jvm.dump, trace, log was not enabled by default
- IJ03607 JIT Compiler: Result String contains a redundant dot when converted from BigDecimal with 0 on all platforms
- IX90185 ORB: Upgrade ibmcfw.jar to version O1800.01
- IJ04282 Security: Change in location and default of jurisdiction policy files
- IJ03853 Security: IBMCAC provider does not support SHA224
- IJ02679 Security: IBMPKCS11Impl – Bad sessions are being allocated internally
- IJ02706 Security: IBMPKCS11Impl – Bad sessions are being allocated internally
- IJ03552 Security: IBMPKCS11Impl - Config file problem with the slot specification attribute
- IJ01901 Security: IBMPKCS11Impl – SecureRandom.setSeed() exception
- IJ03801 Security: Issue with same DN certs, iKeyman GUI error with stash, JKS Chain issue and JVM argument parse issue with iKeyman
-
IJ02284 JIT Compiler: Division by zero in JIT compiler
-
Make it possible to run Java jnlp files from Firefox. (bsc#1057460)
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Point of Service 11 SP3
zypper in -t patch sleposp3-java-1_7_0-ibm-13503=1
-
SUSE Linux Enterprise Server 11 SP3 LTSS 11-SP3
zypper in -t patch slessp3-java-1_7_0-ibm-13503=1
Package List:
-
SUSE Linux Enterprise Point of Service 11 SP3 (nosrc i586)
- java-1_7_0-ibm-1.7.0_sr10.20-65.13.1
-
SUSE Linux Enterprise Point of Service 11 SP3 (i586)
- java-1_7_0-ibm-devel-1.7.0_sr10.20-65.13.1
- java-1_7_0-ibm-jdbc-1.7.0_sr10.20-65.13.1
- java-1_7_0-ibm-alsa-1.7.0_sr10.20-65.13.1
- java-1_7_0-ibm-plugin-1.7.0_sr10.20-65.13.1
-
SUSE Linux Enterprise Server 11 SP3 LTSS 11-SP3 (nosrc s390x x86_64 i586)
- java-1_7_0-ibm-1.7.0_sr10.20-65.13.1
-
SUSE Linux Enterprise Server 11 SP3 LTSS 11-SP3 (x86_64 i586)
- java-1_7_0-ibm-alsa-1.7.0_sr10.20-65.13.1
- java-1_7_0-ibm-plugin-1.7.0_sr10.20-65.13.1
-
SUSE Linux Enterprise Server 11 SP3 LTSS 11-SP3 (s390x x86_64 i586)
- java-1_7_0-ibm-jdbc-1.7.0_sr10.20-65.13.1
- java-1_7_0-ibm-devel-1.7.0_sr10.20-65.13.1
References:
- https://www.suse.com/security/cve/CVE-2018-2579.html
- https://www.suse.com/security/cve/CVE-2018-2582.html
- https://www.suse.com/security/cve/CVE-2018-2588.html
- https://www.suse.com/security/cve/CVE-2018-2599.html
- https://www.suse.com/security/cve/CVE-2018-2602.html
- https://www.suse.com/security/cve/CVE-2018-2603.html
- https://www.suse.com/security/cve/CVE-2018-2618.html
- https://www.suse.com/security/cve/CVE-2018-2633.html
- https://www.suse.com/security/cve/CVE-2018-2634.html
- https://www.suse.com/security/cve/CVE-2018-2637.html
- https://www.suse.com/security/cve/CVE-2018-2641.html
- https://www.suse.com/security/cve/CVE-2018-2657.html
- https://www.suse.com/security/cve/CVE-2018-2663.html
- https://www.suse.com/security/cve/CVE-2018-2677.html
- https://www.suse.com/security/cve/CVE-2018-2678.html
- https://bugzilla.suse.com/show_bug.cgi?id=1057460
- https://bugzilla.suse.com/show_bug.cgi?id=1076390
- https://bugzilla.suse.com/show_bug.cgi?id=1082810
- https://bugzilla.suse.com/show_bug.cgi?id=929900
- https://bugzilla.suse.com/show_bug.cgi?id=966304