drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in java-1_8_0-ibm
Name: |
Mehrere Probleme in java-1_8_0-ibm |
|
ID: |
SUSE-SU-2018:4064-1 |
|
Distribution: |
SUSE |
|
Plattformen: |
SUSE OpenStack Cloud 7, SUSE Linux Enterprise Server 12-SP1-LTSS, SUSE Linux Enterprise Server for SAP 12-SP2, SUSE Linux Enterprise Server 12-SP3, SUSE Linux Enterprise Software Development Kit 12-SP3, SUSE Enterprise Storage 4, SUSE Linux Enterprise Server 12-SP2-LTSS, SUSE Linux Enterprise Server 12-SP2-BCL, SUSE Linux Enterprise Server 12-SP4, SUSE Linux Enterprise Software Development Kit 12-SP4 |
|
Datum: |
Mo, 10. Dezember 2018, 20:14 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13785
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3139
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3169
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3183
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3214
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3149
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3136
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3180 |
|
Applikationen: |
IBM JDK for Linux |
|
Originalnachricht |
--===============7668859703809753540== Content-Type: text/plain
SUSE Security Update: Security update for java-1_8_0-ibm ______________________________________________________________________________
Announcement ID: SUSE-SU-2018:4064-1 Rating: important References: #1116574 Cross-References: CVE-2018-13785 CVE-2018-3136 CVE-2018-3139 CVE-2018-3149 CVE-2018-3169 CVE-2018-3180 CVE-2018-3183 CVE-2018-3214 Affected Products: SUSE OpenStack Cloud 7 SUSE Linux Enterprise Software Development Kit 12-SP4 SUSE Linux Enterprise Software Development Kit 12-SP3 SUSE Linux Enterprise Server for SAP 12-SP2 SUSE Linux Enterprise Server 12-SP4 SUSE Linux Enterprise Server 12-SP3 SUSE Linux Enterprise Server 12-SP2-LTSS SUSE Linux Enterprise Server 12-SP2-BCL SUSE Linux Enterprise Server 12-SP1-LTSS SUSE Enterprise Storage 4 ______________________________________________________________________________
An update that fixes 8 vulnerabilities is now available.
Description:
java-1_8_0-ibm was updated to Java 8.0 Service Refresh 5 Fix Pack 25 (bsc#1116574)
* Class Libraries:
- IJ10934 CVE-2018-13785 - IJ10935 CVE-2018-3136 - IJ10895 CVE-2018-3139 - IJ10932 CVE-2018-3149 - IJ10894 CVE-2018-3180 - IJ10930 CVE-2018-3183 - IJ10933 CVE-2018-3214 - IJ09315 FLOATING POINT EXCEPTION FROM JAVA.TEXT.DECIMALFORMAT. FORMAT - IJ09088 INTRODUCING A NEW PROPERTY FOR TURKEY TIMEZONE FOR PRODUCTS NOT IDENTIFYING TRT - IJ10800 REMOVE EXPIRING ROOT CERTIFICATES IN IBM JDK’S CACERTS. - IJ10566 SUPPORT EBCDIC CODE PAGE IBM-274 – BELGIUM EBCDIC
* Java Virtual Machine
- IJ08730 APPLICATION SIGNAL HANDLER NOT INVOKED FOR SIGABRT - IJ10453 ASSERTION FAILURE AT CLASSPATHITEM.CPP - IJ09574 CLASSLOADER DEFINED THROUGH SYSTEM PROPERTY ‘JAVA.SYSTEM.CLASS.LOADE R’ IS NOT HONORED. - IJ10931 CVE-2018-3169 - IJ10618 GPU SORT: UNSPECIFIED LAUNCH FAILURE - IJ10619 INCORRECT ILLEGALARGUMENTEXCEPTION BECAUSE OBJECT IS NOT AN INSTANCE OF DECLARING CLASS ON REFLECTIVE INVOCATION - IJ10135 JVM HUNG IN GARBAGECOLLECTORMXBEAN.G ETLASTGCINFO() API - IJ10680 RECURRENT ABORTED SCAVENGE
* ORB
- IX90187 CLIENTREQUESTIMPL.REINVO KE FAILS WITH JAVA.LANG.INDEXOUTOFBOUN DSEXCEPTION
* Reliability and Serviceability
- IJ09600 DTFJ AND JDMPVIEW FAIL TO PARSE WIDE REGISTER VALUES
* Security
- IJ10492 'EC KEYSIZE < 384' IS NOT HONORED USING THE 'JDK.TLS.DISABLEDALGORIT HMS' SECURITY PROPERTY - IJ10310 ADD NULL CHECKING ON THE ENCRYPTION TYPES LIST TO CREDENTIALS.GETDEFAULTNA TIVECREDS() METHOD - IJ10491 AES/GCM CIPHER – AAD NOT RESET TO UN-INIT STATE AFTER DOFINAL( ) AND INIT( ) - IJ08442 HTTP PUBLIC KEY PINNING FINGERPRINT,PROBLEM WITH CONVERTING TO JKS KEYSTORE - IJ09107 IBMPKCS11IMPL CRYPTO PROVIDER – INTERMITTENT ERROR WITH SECP521R1 SIGNATURE ON Z/OS - IJ10136 IBMPKCS11IMPL – INTERMITTENT ERROR WITH SECP521R1 SIG ON Z/OS AND Z/LINUX - IJ08530 IBMPKCS11IMPL PROVIDER USES THE WRONG RSA CIPHER MECHANISM FOR THE RSA/ECB/PKCS1PADDING CIPHER - IJ08723 JAAS THROWS A ‘ARRAY INDEX OUT OF RANGE’ EXCEPTION - IJ08704 THE SECURITY PROPERTY ‘JDK.CERTPATH.DISABLEDAL GORITHMS’ IS MISTAKENLY BEING USED TO FILTER JAR SIGNING ALGORITHMS
* z/OS Extentions
- PH03889 ADD SUPPORT FOR TRY-WITH-RESOURCES TO COM.IBM.JZOS.ENQUEUE - PH03414 ROLLOVER FROM SYE TO SAE FOR ICSF REASON CODE 3059 - PH04008 ZERTJSSE – Z SYSTEMS ENCRYPTION READINESS TOOL (ZERT) NEW SUPPORT IN THE Z/OS JAVA SDK
This includes the update to Java 8.0 Service Refresh 5 Fix Pack 22:
* Java Virtual Machine
- IJ09139 CUDA4J NOT AVAILABLE ON ALL PLATFORMS
* JIT Compiler
- IJ09089 CRASH DURING COMPILATION IN USEREGISTER ON X86-32 - IJ08655 FLOATING POINT ERROR (SIGFPE) IN ZJ9SYM1 OR ANY VM/JIT MODULE ON AN INSTRUCTION FOLLOWING A VECTOR INSTRUCTION - IJ08850 CRASH IN ARRAYLIST$ITR.NEXT() - IJ09601 JVM CRASHES ON A SIGBUS SIGNAL WHEN ACCESSING A DIRECTBYTEBUFFER
* z/OS Extentions
- PH02999 JZOS data management classes accept dataset names in code pages supported by z/OS system services - PH01244 OUTPUT BUFFER TOO SHORT FOR GCM MODE ENCRYPTION USING IBMJCEHYBRID
Also the update to Java 8.0 Service Refresh 5 Fix Pack 21
* Class Libraries
- IJ08569 JAVA.IO.IOEXCEPTION OCCURS WHEN A FILECHANNEL IS BIGGER THAN 2GB ON AIX PLATFORM - IJ08570 JAVA.LANG.UNSATISFIEDLIN KERROR WITH JAVA OPTION -DSUN.JAVA2D.CMM=SUN.JAV A2D.CMM.KCMS.KCMSSERVICE PROVIDER ON AIX PLATFORM
* Java Virtual Machine
- IJ08001 30% THROUGHPUT DROP FOR CERTAIN SYNCHRONIZATION WORKLOADS - IJ07997 TRACEASSERT IN GARBAGE COLLECTOR(MEMORYSUBSPACE)
* JIT Compiler
- IJ08503 ASSERTION IS HIT DUE TO UNEXPECTED STACK HEIGHT IN DEBUGGING MODE - IJ08375 CRASH DURING HARDWARE GENERATED GUARDED STORAGE EVENT WITHIN A TRANSACTIONAL EXECUTION REGION WHEN RUNNING WITH -XGC:CONCURRENTS - IJ08205 CRASH WHILE COMPILING - IJ09575 INCORRECT RESULT WHEN USING JAVA.LANG.MATH.MIN OR MAX ON 31-BIT JVM - IJ07886 INCORRECT CALUCATIONS WHEN USING NUMBERFORMAT.FORMAT() AND BIGDECIMAL.{FLOAT/DOUBLE }VALUE()
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- SUSE OpenStack Cloud 7:
zypper in -t patch SUSE-OpenStack-Cloud-7-2018-2886=1
- SUSE Linux Enterprise Software Development Kit 12-SP4:
zypper in -t patch SUSE-SLE-SDK-12-SP4-2018-2886=1
- SUSE Linux Enterprise Software Development Kit 12-SP3:
zypper in -t patch SUSE-SLE-SDK-12-SP3-2018-2886=1
- SUSE Linux Enterprise Server for SAP 12-SP2:
zypper in -t patch SUSE-SLE-SAP-12-SP2-2018-2886=1
- SUSE Linux Enterprise Server 12-SP4:
zypper in -t patch SUSE-SLE-SERVER-12-SP4-2018-2886=1
- SUSE Linux Enterprise Server 12-SP3:
zypper in -t patch SUSE-SLE-SERVER-12-SP3-2018-2886=1
- SUSE Linux Enterprise Server 12-SP2-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-SP2-2018-2886=1
- SUSE Linux Enterprise Server 12-SP2-BCL:
zypper in -t patch SUSE-SLE-SERVER-12-SP2-BCL-2018-2886=1
- SUSE Linux Enterprise Server 12-SP1-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-SP1-2018-2886=1
- SUSE Enterprise Storage 4:
zypper in -t patch SUSE-Storage-4-2018-2886=1
Package List:
- SUSE OpenStack Cloud 7 (s390x x86_64):
java-1_8_0-ibm-1.8.0_sr5.25-30.39.1 java-1_8_0-ibm-devel-1.8.0_sr5.25-30.39.1
- SUSE OpenStack Cloud 7 (x86_64):
java-1_8_0-ibm-alsa-1.8.0_sr5.25-30.39.1 java-1_8_0-ibm-plugin-1.8.0_sr5.25-30.39.1
- SUSE Linux Enterprise Software Development Kit 12-SP4 (ppc64le s390x x86_64):
java-1_8_0-ibm-devel-1.8.0_sr5.25-30.39.1
- SUSE Linux Enterprise Software Development Kit 12-SP3 (ppc64le s390x x86_64):
java-1_8_0-ibm-devel-1.8.0_sr5.25-30.39.1
- SUSE Linux Enterprise Server for SAP 12-SP2 (ppc64le x86_64):
java-1_8_0-ibm-1.8.0_sr5.25-30.39.1 java-1_8_0-ibm-devel-1.8.0_sr5.25-30.39.1
- SUSE Linux Enterprise Server for SAP 12-SP2 (x86_64):
java-1_8_0-ibm-alsa-1.8.0_sr5.25-30.39.1 java-1_8_0-ibm-plugin-1.8.0_sr5.25-30.39.1
- SUSE Linux Enterprise Server 12-SP4 (ppc64le s390x x86_64):
java-1_8_0-ibm-1.8.0_sr5.25-30.39.1
- SUSE Linux Enterprise Server 12-SP4 (x86_64):
java-1_8_0-ibm-alsa-1.8.0_sr5.25-30.39.1 java-1_8_0-ibm-plugin-1.8.0_sr5.25-30.39.1
- SUSE Linux Enterprise Server 12-SP3 (ppc64le s390x x86_64):
java-1_8_0-ibm-1.8.0_sr5.25-30.39.1
- SUSE Linux Enterprise Server 12-SP3 (x86_64):
java-1_8_0-ibm-alsa-1.8.0_sr5.25-30.39.1 java-1_8_0-ibm-plugin-1.8.0_sr5.25-30.39.1
- SUSE Linux Enterprise Server 12-SP2-LTSS (ppc64le s390x x86_64):
java-1_8_0-ibm-1.8.0_sr5.25-30.39.1 java-1_8_0-ibm-devel-1.8.0_sr5.25-30.39.1
- SUSE Linux Enterprise Server 12-SP2-LTSS (x86_64):
java-1_8_0-ibm-alsa-1.8.0_sr5.25-30.39.1 java-1_8_0-ibm-plugin-1.8.0_sr5.25-30.39.1
- SUSE Linux Enterprise Server 12-SP2-BCL (x86_64):
java-1_8_0-ibm-1.8.0_sr5.25-30.39.1 java-1_8_0-ibm-alsa-1.8.0_sr5.25-30.39.1 java-1_8_0-ibm-devel-1.8.0_sr5.25-30.39.1 java-1_8_0-ibm-plugin-1.8.0_sr5.25-30.39.1
- SUSE Linux Enterprise Server 12-SP1-LTSS (ppc64le s390x x86_64):
java-1_8_0-ibm-1.8.0_sr5.25-30.39.1 java-1_8_0-ibm-devel-1.8.0_sr5.25-30.39.1
- SUSE Linux Enterprise Server 12-SP1-LTSS (x86_64):
java-1_8_0-ibm-alsa-1.8.0_sr5.25-30.39.1 java-1_8_0-ibm-plugin-1.8.0_sr5.25-30.39.1
- SUSE Enterprise Storage 4 (x86_64):
java-1_8_0-ibm-1.8.0_sr5.25-30.39.1 java-1_8_0-ibm-alsa-1.8.0_sr5.25-30.39.1 java-1_8_0-ibm-devel-1.8.0_sr5.25-30.39.1 java-1_8_0-ibm-plugin-1.8.0_sr5.25-30.39.1
References:
https://www.suse.com/security/cve/CVE-2018-13785.html https://www.suse.com/security/cve/CVE-2018-3136.html https://www.suse.com/security/cve/CVE-2018-3139.html https://www.suse.com/security/cve/CVE-2018-3149.html https://www.suse.com/security/cve/CVE-2018-3169.html https://www.suse.com/security/cve/CVE-2018-3180.html https://www.suse.com/security/cve/CVE-2018-3183.html https://www.suse.com/security/cve/CVE-2018-3214.html https://bugzilla.suse.com/1116574
--===============7668859703809753540== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline
_______________________________________________ sle-security-updates mailing list sle-security-updates@lists.suse.com http://lists.suse.com/mailman/listinfo/sle-security-updates
--===============7668859703809753540==--
|
|
|
|