Security update for java-1_8_0-ibm

Announcement ID: SUSE-SU-2018:0665-1
Rating: important
References:
Cross-References:
CVSS scores:
  • CVE-2018-2579 ( SUSE ): 3.7 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
  • CVE-2018-2579 ( NVD ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
  • CVE-2018-2579 ( NVD ): 3.7 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
  • CVE-2018-2582 ( SUSE ): 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
  • CVE-2018-2582 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
  • CVE-2018-2582 ( NVD ): 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
  • CVE-2018-2588 ( SUSE ): 4.3 CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
  • CVE-2018-2588 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
  • CVE-2018-2588 ( NVD ): 4.3 CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
  • CVE-2018-2599 ( SUSE ): 4.8 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L
  • CVE-2018-2599 ( NVD ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L
  • CVE-2018-2599 ( NVD ): 4.8 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L
  • CVE-2018-2602 ( SUSE ): 4.5 CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
  • CVE-2018-2602 ( NVD ): 4.5 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
  • CVE-2018-2602 ( NVD ): 4.5 CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
  • CVE-2018-2603 ( SUSE ): 5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
  • CVE-2018-2603 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
  • CVE-2018-2603 ( NVD ): 5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
  • CVE-2018-2618 ( SUSE ): 5.9 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
  • CVE-2018-2618 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
  • CVE-2018-2618 ( NVD ): 5.9 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
  • CVE-2018-2633 ( SUSE ): 8.3 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
  • CVE-2018-2633 ( NVD ): 8.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
  • CVE-2018-2633 ( NVD ): 8.3 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
  • CVE-2018-2634 ( SUSE ): 6.8 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
  • CVE-2018-2634 ( NVD ): 6.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
  • CVE-2018-2634 ( NVD ): 6.8 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
  • CVE-2018-2637 ( SUSE ): 7.4 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
  • CVE-2018-2637 ( NVD ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
  • CVE-2018-2637 ( NVD ): 7.4 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
  • CVE-2018-2638 ( NVD ): 8.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
  • CVE-2018-2638 ( NVD ): 8.3 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
  • CVE-2018-2639 ( NVD ): 8.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
  • CVE-2018-2639 ( NVD ): 8.3 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
  • CVE-2018-2641 ( SUSE ): 6.1 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N
  • CVE-2018-2641 ( NVD ): 6.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N
  • CVE-2018-2641 ( NVD ): 6.1 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N
  • CVE-2018-2663 ( SUSE ): 4.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
  • CVE-2018-2663 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
  • CVE-2018-2663 ( NVD ): 4.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
  • CVE-2018-2677 ( SUSE ): 4.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
  • CVE-2018-2677 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
  • CVE-2018-2677 ( NVD ): 4.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
  • CVE-2018-2678 ( SUSE ): 4.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
  • CVE-2018-2678 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
  • CVE-2018-2678 ( NVD ): 4.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
Affected Products:
  • SUSE Linux Enterprise Desktop 12 SP2
  • SUSE Linux Enterprise Desktop 12 SP3
  • SUSE Linux Enterprise High Performance Computing 12 SP2
  • SUSE Linux Enterprise High Performance Computing 12 SP3
  • SUSE Linux Enterprise Server 12 SP1
  • SUSE Linux Enterprise Server 12 SP1 LTSS 12-SP1
  • SUSE Linux Enterprise Server 12 SP2
  • SUSE Linux Enterprise Server 12 SP3
  • SUSE Linux Enterprise Server for SAP Applications 12 SP1
  • SUSE Linux Enterprise Server for SAP Applications 12 SP2
  • SUSE Linux Enterprise Server for SAP Applications 12 SP3
  • SUSE Linux Enterprise Software Development Kit 12 12-SP2
  • SUSE Linux Enterprise Software Development Kit 12 SP3
  • SUSE OpenStack Cloud 6

An update that solves 16 vulnerabilities can now be installed.

Description:

This update for java-1_8_0-ibm fixes the following issues:

  • Removed java-1_8_0-ibm-alsa and java-1_8_0-ibm-plugin entries in baselibs.conf due to errors in osc source_validator

Version update to 8.0.5.10 [bsc#1082810]

  • Security fixes:

    CVE-2018-2639 CVE-2018-2638 CVE-2018-2633 CVE-2018-2637 CVE-2018-2634 CVE-2018-2582 CVE-2018-2641 CVE-2018-2618 CVE-2018-2603 CVE-2018-2599 CVE-2018-2602 CVE-2018-2678 CVE-2018-2677 CVE-2018-2663 CVE-2018-2588 CVE-2018-2579

  • Defect fixes:

    • IJ02608 Class Libraries: Change of namespace definitions with handlers that implement javax.xml.ws.handler.soap.soaphandler
    • IJ04280 Class Libraries: Deploy Upgrade to Oracle level 8u161-b12
    • IJ03390 Class Libraries: JCL Upgrade to Oracle level 8u161-b12
    • IJ04001 Class Libraries: Performance improvement with child process on AIX
    • IJ04281 Class Libraries: Startup time increase after applying apar IV96905
    • IJ03822 Class Libraries: Update timezone information to tzdata2017c
    • IJ03440 Java Virtual Machine: Assertion failure during class creation
    • IJ03717 Java Virtual Machine: Assertion for gencon with concurrent scavenger on ZOS64
    • IJ03513 Java Virtual Machine: Assertion in concurrent scavenger if initial heap memory size -Xms is set too low
    • IJ03994 Java Virtual Machine: Class.getmethods() does not return all methods
    • IJ03413 Java Virtual Machine: Hang creating thread after redefining classes
    • IJ03852 Java Virtual Machine: ICH408I message when groupaccess is specified with -xshareclasses
    • IJ03716 Java Virtual Machine: java/lang/linkageerror from sun/misc/unsafe.definean onymousclass()
    • IJ03116 Java Virtual Machine: java.fullversion string contains an extra space
    • IJ03347 Java Virtual Machine: java.lang.IllegalStateException in related class MemoryMXBean
    • IJ03878 Java Virtual Machine: java.lang.StackOverflowError is thrown when custom security manager in place
    • IJ03605 Java Virtual Machine: Legacy security for com.ibm.jvm.dump, trace, log was not enabled by default
    • IJ04248 JIT Compiler: ArrayIndexOutOfBoundsException is thrown when converting BigDecimal to String
    • IJ04250 JIT Compiler: Assertion failure with concurrentScavenge on Z14
    • IJ03606 JIT Compiler: Java crashes with -version
    • IJ04251 JIT Compiler: JIT compiled method that takes advantage of AutoSIMD produces an incorrect result on x86
    • IJ03854 JIT Compiler: JVM info message appears in stdout
    • IJ03607 JIT Compiler: Result String contains a redundant dot when converted from BigDecimal with 0 on all platforms
    • IX90185 ORB: Upgrade ibmcfw.jar to version O1800.01
    • IJ03715 Security: Add additional support for the IBMJCEPlus provider, add support for new IBMJCEPlusFIPS provider
    • IJ03800 Security: A fix in CMS provider for KDB integrity
    • IJ04282 Security: Change in location and default of jurisdiction policy files
    • IJ03853 Security: IBMCAC provider does not support SHA224
    • IJ02679 Security: IBMPKCS11Impl – Bad sessions are being allocated internally
    • IJ02706 Security: IBMPKCS11Impl – Bad sessions are being allocated internally
    • IJ03552 Security: IBMPKCS11Impl - Config file problem with the slot specification attribute
    • IJ01901 Security: IBMPKCS11Impl – SecureRandom.setSeed() exception
    • IJ03801 Security: Issue with same DN certs, iKeyman GUI error with stash, JKS Chain issue and JVM argument parse issue with iKeyman
    • IJ03256 Security: javax.security.auth.Subject.toString() throws NPE
    • PI93233 z/OS Extentions: Cipher.doFinal() fails when using AES/GCM/nopadding with AAD data of 13 bytes and a block size of 4081 to 4096
  • Fixes in 8.0.5.7:

    • IJ02605 Class Libraries: Update IBM-1371 charset with new specification support
    • IJ02541 Java Virtual Machine: Assertions in GC when jvmti runs with Concurrent Scavenger
    • IJ02443 Java Virtual Machine: Committed eden region size is bigger than maximum eden region size
    • IJ02378 Java Virtual Machine: Existing signal action for SIG_IGN/SIG_DFL is not detected properly
    • IJ02758 JIT Compiler: Crash in JIT module during method compilation
    • IJ02733 JIT Compiler: Crash in jit module when compiling in non-default configuration
  • Fixes in 8.0.5.6:

    • IJ02283 Java Virtual Machine: IllegalAccessException due to a missing access check for the same class in MethodHandle apis
    • IJ02082 Java Virtual Machine: The default value for class unloading kick off threshold is not set
    • IJ02018 JIT Compiler: Crash or assertion while attempting to acquire VM access
    • IJ02284 JIT Compiler: Division by zero in JIT compiler
    • IV88941 JIT Compiler: JIT compiler takes far too long to compile a method
    • IJ02285 JIT Compiler: Performance degradation during class unloading in Java 8 SR5
  • Support Java jnlp files run from Firefox. [bsc#1076390]

Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  • SUSE OpenStack Cloud 6
    zypper in -t patch SUSE-OpenStack-Cloud-6-2018-447=1
  • SUSE Linux Enterprise Server for SAP Applications 12 SP1
    zypper in -t patch SUSE-SLE-SAP-12-SP1-2018-447=1
  • SUSE Linux Enterprise Software Development Kit 12 12-SP2
    zypper in -t patch SUSE-SLE-SDK-12-SP2-2018-447=1
  • SUSE Linux Enterprise Software Development Kit 12 SP3
    zypper in -t patch SUSE-SLE-SDK-12-SP3-2018-447=1
  • SUSE Linux Enterprise Server 12 SP1 LTSS 12-SP1
    zypper in -t patch SUSE-SLE-SERVER-12-SP1-2018-447=1
  • SUSE Linux Enterprise Server for SAP Applications 12 SP2
    zypper in -t patch SUSE-SLE-SERVER-12-SP2-2018-447=1
  • SUSE Linux Enterprise Server 12 SP2
    zypper in -t patch SUSE-SLE-SERVER-12-SP2-2018-447=1
  • SUSE Linux Enterprise High Performance Computing 12 SP2
    zypper in -t patch SUSE-SLE-SERVER-12-SP2-2018-447=1
  • SUSE Linux Enterprise Server 12 SP3
    zypper in -t patch SUSE-SLE-SERVER-12-SP3-2018-447=1
  • SUSE Linux Enterprise Server for SAP Applications 12 SP3
    zypper in -t patch SUSE-SLE-SERVER-12-SP3-2018-447=1
  • SUSE Linux Enterprise High Performance Computing 12 SP3
    zypper in -t patch SUSE-SLE-SERVER-12-SP3-2018-447=1

Package List:

  • SUSE OpenStack Cloud 6 (nosrc x86_64)
    • java-1_8_0-ibm-1.8.0_sr5.10-30.16.1
  • SUSE OpenStack Cloud 6 (x86_64)
    • java-1_8_0-ibm-alsa-1.8.0_sr5.10-30.16.1
    • java-1_8_0-ibm-devel-1.8.0_sr5.10-30.16.1
    • java-1_8_0-ibm-plugin-1.8.0_sr5.10-30.16.1
  • SUSE Linux Enterprise Server for SAP Applications 12 SP1 (nosrc ppc64le x86_64)
    • java-1_8_0-ibm-1.8.0_sr5.10-30.16.1
  • SUSE Linux Enterprise Server for SAP Applications 12 SP1 (ppc64le x86_64)
    • java-1_8_0-ibm-devel-1.8.0_sr5.10-30.16.1
  • SUSE Linux Enterprise Server for SAP Applications 12 SP1 (x86_64)
    • java-1_8_0-ibm-alsa-1.8.0_sr5.10-30.16.1
    • java-1_8_0-ibm-plugin-1.8.0_sr5.10-30.16.1
  • SUSE Linux Enterprise Software Development Kit 12 12-SP2 (nosrc)
    • java-1_8_0-ibm-1.8.0_sr5.10-30.16.1
  • SUSE Linux Enterprise Software Development Kit 12 12-SP2 (ppc64le s390x x86_64)
    • java-1_8_0-ibm-devel-1.8.0_sr5.10-30.16.1
  • SUSE Linux Enterprise Software Development Kit 12 SP3 (nosrc)
    • java-1_8_0-ibm-1.8.0_sr5.10-30.16.1
  • SUSE Linux Enterprise Software Development Kit 12 SP3 (ppc64le s390x x86_64)
    • java-1_8_0-ibm-devel-1.8.0_sr5.10-30.16.1
  • SUSE Linux Enterprise Server 12 SP1 LTSS 12-SP1 (nosrc ppc64le s390x x86_64)
    • java-1_8_0-ibm-1.8.0_sr5.10-30.16.1
  • SUSE Linux Enterprise Server 12 SP1 LTSS 12-SP1 (ppc64le s390x x86_64)
    • java-1_8_0-ibm-devel-1.8.0_sr5.10-30.16.1
  • SUSE Linux Enterprise Server 12 SP1 LTSS 12-SP1 (x86_64)
    • java-1_8_0-ibm-alsa-1.8.0_sr5.10-30.16.1
    • java-1_8_0-ibm-plugin-1.8.0_sr5.10-30.16.1
  • SUSE Linux Enterprise Server for SAP Applications 12 SP2 (nosrc ppc64le x86_64)
    • java-1_8_0-ibm-1.8.0_sr5.10-30.16.1
  • SUSE Linux Enterprise Server for SAP Applications 12 SP2 (x86_64)
    • java-1_8_0-ibm-alsa-1.8.0_sr5.10-30.16.1
    • java-1_8_0-ibm-plugin-1.8.0_sr5.10-30.16.1
  • SUSE Linux Enterprise Server 12 SP2 (nosrc ppc64le s390x x86_64)
    • java-1_8_0-ibm-1.8.0_sr5.10-30.16.1
  • SUSE Linux Enterprise Server 12 SP2 (x86_64)
    • java-1_8_0-ibm-alsa-1.8.0_sr5.10-30.16.1
    • java-1_8_0-ibm-plugin-1.8.0_sr5.10-30.16.1
  • SUSE Linux Enterprise High Performance Computing 12 SP2 (nosrc x86_64)
    • java-1_8_0-ibm-1.8.0_sr5.10-30.16.1
  • SUSE Linux Enterprise High Performance Computing 12 SP2 (x86_64)
    • java-1_8_0-ibm-alsa-1.8.0_sr5.10-30.16.1
    • java-1_8_0-ibm-plugin-1.8.0_sr5.10-30.16.1
  • SUSE Linux Enterprise Server 12 SP3 (nosrc ppc64le s390x x86_64)
    • java-1_8_0-ibm-1.8.0_sr5.10-30.16.1
  • SUSE Linux Enterprise Server 12 SP3 (x86_64)
    • java-1_8_0-ibm-alsa-1.8.0_sr5.10-30.16.1
    • java-1_8_0-ibm-plugin-1.8.0_sr5.10-30.16.1
  • SUSE Linux Enterprise Server for SAP Applications 12 SP3 (nosrc ppc64le x86_64)
    • java-1_8_0-ibm-1.8.0_sr5.10-30.16.1
  • SUSE Linux Enterprise Server for SAP Applications 12 SP3 (x86_64)
    • java-1_8_0-ibm-alsa-1.8.0_sr5.10-30.16.1
    • java-1_8_0-ibm-plugin-1.8.0_sr5.10-30.16.1
  • SUSE Linux Enterprise High Performance Computing 12 SP3 (nosrc x86_64)
    • java-1_8_0-ibm-1.8.0_sr5.10-30.16.1
  • SUSE Linux Enterprise High Performance Computing 12 SP3 (x86_64)
    • java-1_8_0-ibm-alsa-1.8.0_sr5.10-30.16.1
    • java-1_8_0-ibm-plugin-1.8.0_sr5.10-30.16.1

References: