Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in java-1_8_0-ibm
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in java-1_8_0-ibm
ID: SUSE-SU-2018:4064-1
Distribution: SUSE
Plattformen: SUSE OpenStack Cloud 7, SUSE Linux Enterprise Server 12-SP1-LTSS, SUSE Linux Enterprise Server for SAP 12-SP2, SUSE Linux Enterprise Server 12-SP3, SUSE Linux Enterprise Software Development Kit 12-SP3, SUSE Enterprise Storage 4, SUSE Linux Enterprise Server 12-SP2-LTSS, SUSE Linux Enterprise Server 12-SP2-BCL, SUSE Linux Enterprise Server 12-SP4, SUSE Linux Enterprise Software Development Kit 12-SP4
Datum: Mo, 10. Dezember 2018, 20:14
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13785
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3139
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3169
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3183
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3214
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3149
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3136
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3180
Applikationen: IBM JDK for Linux

Originalnachricht

--===============7668859703809753540==
Content-Type: text/plain

SUSE Security Update: Security update for java-1_8_0-ibm
______________________________________________________________________________

Announcement ID: SUSE-SU-2018:4064-1
Rating: important
References: #1116574
Cross-References: CVE-2018-13785 CVE-2018-3136 CVE-2018-3139
CVE-2018-3149 CVE-2018-3169 CVE-2018-3180
CVE-2018-3183 CVE-2018-3214
Affected Products:
SUSE OpenStack Cloud 7
SUSE Linux Enterprise Software Development Kit 12-SP4
SUSE Linux Enterprise Software Development Kit 12-SP3
SUSE Linux Enterprise Server for SAP 12-SP2
SUSE Linux Enterprise Server 12-SP4
SUSE Linux Enterprise Server 12-SP3
SUSE Linux Enterprise Server 12-SP2-LTSS
SUSE Linux Enterprise Server 12-SP2-BCL
SUSE Linux Enterprise Server 12-SP1-LTSS
SUSE Enterprise Storage 4
______________________________________________________________________________

An update that fixes 8 vulnerabilities is now available.

Description:


java-1_8_0-ibm was updated to Java 8.0 Service Refresh 5 Fix Pack 25
(bsc#1116574)

* Class Libraries:

- IJ10934 CVE-2018-13785
- IJ10935 CVE-2018-3136
- IJ10895 CVE-2018-3139
- IJ10932 CVE-2018-3149
- IJ10894 CVE-2018-3180
- IJ10930 CVE-2018-3183
- IJ10933 CVE-2018-3214
- IJ09315 FLOATING POINT EXCEPTION FROM JAVA.TEXT.DECIMALFORMAT. FORMAT
- IJ09088 INTRODUCING A NEW PROPERTY FOR TURKEY TIMEZONE FOR PRODUCTS
NOT IDENTIFYING TRT
- IJ10800 REMOVE EXPIRING ROOT CERTIFICATES IN IBM JDK’S CACERTS.
- IJ10566 SUPPORT EBCDIC CODE PAGE IBM-274 – BELGIUM EBCDIC

* Java Virtual Machine

- IJ08730 APPLICATION SIGNAL HANDLER NOT INVOKED FOR SIGABRT
- IJ10453 ASSERTION FAILURE AT CLASSPATHITEM.CPP
- IJ09574 CLASSLOADER DEFINED THROUGH SYSTEM PROPERTY
‘JAVA.SYSTEM.CLASS.LOADE R’ IS NOT HONORED.
- IJ10931 CVE-2018-3169
- IJ10618 GPU SORT: UNSPECIFIED LAUNCH FAILURE
- IJ10619 INCORRECT ILLEGALARGUMENTEXCEPTION BECAUSE OBJECT IS NOT AN
INSTANCE OF DECLARING CLASS ON REFLECTIVE INVOCATION
- IJ10135 JVM HUNG IN GARBAGECOLLECTORMXBEAN.G ETLASTGCINFO() API
- IJ10680 RECURRENT ABORTED SCAVENGE

* ORB

- IX90187 CLIENTREQUESTIMPL.REINVO KE FAILS WITH
JAVA.LANG.INDEXOUTOFBOUN DSEXCEPTION

* Reliability and Serviceability

- IJ09600 DTFJ AND JDMPVIEW FAIL TO PARSE WIDE REGISTER VALUES

* Security

- IJ10492 'EC KEYSIZE < 384' IS NOT HONORED USING THE
'JDK.TLS.DISABLEDALGORIT HMS' SECURITY PROPERTY
- IJ10310 ADD NULL CHECKING ON THE ENCRYPTION TYPES LIST TO
CREDENTIALS.GETDEFAULTNA TIVECREDS() METHOD
- IJ10491 AES/GCM CIPHER – AAD NOT RESET TO UN-INIT STATE AFTER
DOFINAL( ) AND INIT( )
- IJ08442 HTTP PUBLIC KEY PINNING FINGERPRINT,PROBLEM WITH CONVERTING TO
JKS KEYSTORE
- IJ09107 IBMPKCS11IMPL CRYPTO PROVIDER – INTERMITTENT ERROR WITH
SECP521R1 SIGNATURE ON Z/OS
- IJ10136 IBMPKCS11IMPL – INTERMITTENT ERROR WITH SECP521R1 SIG ON
Z/OS AND Z/LINUX
- IJ08530 IBMPKCS11IMPL PROVIDER USES THE WRONG RSA CIPHER MECHANISM FOR
THE RSA/ECB/PKCS1PADDING CIPHER
- IJ08723 JAAS THROWS A ‘ARRAY INDEX OUT OF RANGE’ EXCEPTION
- IJ08704 THE SECURITY PROPERTY ‘JDK.CERTPATH.DISABLEDAL GORITHMS’
IS MISTAKENLY BEING USED TO FILTER JAR SIGNING ALGORITHMS

* z/OS Extentions

- PH03889 ADD SUPPORT FOR TRY-WITH-RESOURCES TO COM.IBM.JZOS.ENQUEUE
- PH03414 ROLLOVER FROM SYE TO SAE FOR ICSF REASON CODE 3059
- PH04008 ZERTJSSE – Z SYSTEMS ENCRYPTION READINESS TOOL (ZERT) NEW
SUPPORT IN THE Z/OS JAVA SDK

This includes the update to Java 8.0 Service Refresh 5 Fix Pack 22:

* Java Virtual Machine

- IJ09139 CUDA4J NOT AVAILABLE ON ALL PLATFORMS

* JIT Compiler

- IJ09089 CRASH DURING COMPILATION IN USEREGISTER ON X86-32
- IJ08655 FLOATING POINT ERROR (SIGFPE) IN ZJ9SYM1 OR ANY VM/JIT MODULE
ON AN INSTRUCTION FOLLOWING A VECTOR INSTRUCTION
- IJ08850 CRASH IN ARRAYLIST$ITR.NEXT()
- IJ09601 JVM CRASHES ON A SIGBUS SIGNAL WHEN ACCESSING A
DIRECTBYTEBUFFER

* z/OS Extentions

- PH02999 JZOS data management classes accept dataset names in code
pages supported by z/OS system services
- PH01244 OUTPUT BUFFER TOO SHORT FOR GCM MODE ENCRYPTION USING
IBMJCEHYBRID

Also the update to Java 8.0 Service Refresh 5 Fix Pack 21

* Class Libraries

- IJ08569 JAVA.IO.IOEXCEPTION OCCURS WHEN A FILECHANNEL IS BIGGER THAN
2GB ON AIX PLATFORM
- IJ08570 JAVA.LANG.UNSATISFIEDLIN KERROR WITH JAVA OPTION
-DSUN.JAVA2D.CMM=SUN.JAV A2D.CMM.KCMS.KCMSSERVICE PROVIDER ON AIX
PLATFORM

* Java Virtual Machine

- IJ08001 30% THROUGHPUT DROP FOR CERTAIN SYNCHRONIZATION WORKLOADS
- IJ07997 TRACEASSERT IN GARBAGE COLLECTOR(MEMORYSUBSPACE)

* JIT Compiler

- IJ08503 ASSERTION IS HIT DUE TO UNEXPECTED STACK HEIGHT IN DEBUGGING
MODE
- IJ08375 CRASH DURING HARDWARE GENERATED GUARDED STORAGE EVENT WITHIN A
TRANSACTIONAL EXECUTION REGION WHEN RUNNING WITH -XGC:CONCURRENTS
- IJ08205 CRASH WHILE COMPILING
- IJ09575 INCORRECT RESULT WHEN USING JAVA.LANG.MATH.MIN OR MAX ON
31-BIT JVM
- IJ07886 INCORRECT CALUCATIONS WHEN USING NUMBERFORMAT.FORMAT() AND
BIGDECIMAL.{FLOAT/DOUBLE }VALUE()


Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- SUSE OpenStack Cloud 7:

zypper in -t patch SUSE-OpenStack-Cloud-7-2018-2886=1

- SUSE Linux Enterprise Software Development Kit 12-SP4:

zypper in -t patch SUSE-SLE-SDK-12-SP4-2018-2886=1

- SUSE Linux Enterprise Software Development Kit 12-SP3:

zypper in -t patch SUSE-SLE-SDK-12-SP3-2018-2886=1

- SUSE Linux Enterprise Server for SAP 12-SP2:

zypper in -t patch SUSE-SLE-SAP-12-SP2-2018-2886=1

- SUSE Linux Enterprise Server 12-SP4:

zypper in -t patch SUSE-SLE-SERVER-12-SP4-2018-2886=1

- SUSE Linux Enterprise Server 12-SP3:

zypper in -t patch SUSE-SLE-SERVER-12-SP3-2018-2886=1

- SUSE Linux Enterprise Server 12-SP2-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-SP2-2018-2886=1

- SUSE Linux Enterprise Server 12-SP2-BCL:

zypper in -t patch SUSE-SLE-SERVER-12-SP2-BCL-2018-2886=1

- SUSE Linux Enterprise Server 12-SP1-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-SP1-2018-2886=1

- SUSE Enterprise Storage 4:

zypper in -t patch SUSE-Storage-4-2018-2886=1



Package List:

- SUSE OpenStack Cloud 7 (s390x x86_64):

java-1_8_0-ibm-1.8.0_sr5.25-30.39.1
java-1_8_0-ibm-devel-1.8.0_sr5.25-30.39.1

- SUSE OpenStack Cloud 7 (x86_64):

java-1_8_0-ibm-alsa-1.8.0_sr5.25-30.39.1
java-1_8_0-ibm-plugin-1.8.0_sr5.25-30.39.1

- SUSE Linux Enterprise Software Development Kit 12-SP4 (ppc64le s390x
x86_64):

java-1_8_0-ibm-devel-1.8.0_sr5.25-30.39.1

- SUSE Linux Enterprise Software Development Kit 12-SP3 (ppc64le s390x
x86_64):

java-1_8_0-ibm-devel-1.8.0_sr5.25-30.39.1

- SUSE Linux Enterprise Server for SAP 12-SP2 (ppc64le x86_64):

java-1_8_0-ibm-1.8.0_sr5.25-30.39.1
java-1_8_0-ibm-devel-1.8.0_sr5.25-30.39.1

- SUSE Linux Enterprise Server for SAP 12-SP2 (x86_64):

java-1_8_0-ibm-alsa-1.8.0_sr5.25-30.39.1
java-1_8_0-ibm-plugin-1.8.0_sr5.25-30.39.1

- SUSE Linux Enterprise Server 12-SP4 (ppc64le s390x x86_64):

java-1_8_0-ibm-1.8.0_sr5.25-30.39.1

- SUSE Linux Enterprise Server 12-SP4 (x86_64):

java-1_8_0-ibm-alsa-1.8.0_sr5.25-30.39.1
java-1_8_0-ibm-plugin-1.8.0_sr5.25-30.39.1

- SUSE Linux Enterprise Server 12-SP3 (ppc64le s390x x86_64):

java-1_8_0-ibm-1.8.0_sr5.25-30.39.1

- SUSE Linux Enterprise Server 12-SP3 (x86_64):

java-1_8_0-ibm-alsa-1.8.0_sr5.25-30.39.1
java-1_8_0-ibm-plugin-1.8.0_sr5.25-30.39.1

- SUSE Linux Enterprise Server 12-SP2-LTSS (ppc64le s390x x86_64):

java-1_8_0-ibm-1.8.0_sr5.25-30.39.1
java-1_8_0-ibm-devel-1.8.0_sr5.25-30.39.1

- SUSE Linux Enterprise Server 12-SP2-LTSS (x86_64):

java-1_8_0-ibm-alsa-1.8.0_sr5.25-30.39.1
java-1_8_0-ibm-plugin-1.8.0_sr5.25-30.39.1

- SUSE Linux Enterprise Server 12-SP2-BCL (x86_64):

java-1_8_0-ibm-1.8.0_sr5.25-30.39.1
java-1_8_0-ibm-alsa-1.8.0_sr5.25-30.39.1
java-1_8_0-ibm-devel-1.8.0_sr5.25-30.39.1
java-1_8_0-ibm-plugin-1.8.0_sr5.25-30.39.1

- SUSE Linux Enterprise Server 12-SP1-LTSS (ppc64le s390x x86_64):

java-1_8_0-ibm-1.8.0_sr5.25-30.39.1
java-1_8_0-ibm-devel-1.8.0_sr5.25-30.39.1

- SUSE Linux Enterprise Server 12-SP1-LTSS (x86_64):

java-1_8_0-ibm-alsa-1.8.0_sr5.25-30.39.1
java-1_8_0-ibm-plugin-1.8.0_sr5.25-30.39.1

- SUSE Enterprise Storage 4 (x86_64):

java-1_8_0-ibm-1.8.0_sr5.25-30.39.1
java-1_8_0-ibm-alsa-1.8.0_sr5.25-30.39.1
java-1_8_0-ibm-devel-1.8.0_sr5.25-30.39.1
java-1_8_0-ibm-plugin-1.8.0_sr5.25-30.39.1


References:

https://www.suse.com/security/cve/CVE-2018-13785.html
https://www.suse.com/security/cve/CVE-2018-3136.html
https://www.suse.com/security/cve/CVE-2018-3139.html
https://www.suse.com/security/cve/CVE-2018-3149.html
https://www.suse.com/security/cve/CVE-2018-3169.html
https://www.suse.com/security/cve/CVE-2018-3180.html
https://www.suse.com/security/cve/CVE-2018-3183.html
https://www.suse.com/security/cve/CVE-2018-3214.html
https://bugzilla.suse.com/1116574


--===============7668859703809753540==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
sle-security-updates mailing list
sle-security-updates@lists.suse.com
http://lists.suse.com/mailman/listinfo/sle-security-updates

--===============7668859703809753540==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung