Bug 1112153 - VUL-0: CVE-2018-13785: java-1_7_0-openjdk, java-1_8_0-openjdk: Unspecified vulnerability in subcomponent: Deployment (libpng)
Summary: VUL-0: CVE-2018-13785: java-1_7_0-openjdk, java-1_8_0-openjdk: Unspecified vu...
Status: RESOLVED INVALID
Alias: None
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Fridrich Strba
QA Contact: Security Team bot
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2018-10-17 10:20 UTC by Alexander Bergmann
Modified: 2019-04-27 22:10 UTC (History)
1 user (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Alexander Bergmann 2018-10-17 10:20:58 UTC
Oracle October 2018 Patch Day.

The original issue comes from libpng that was handled inside bsc#1100687.

https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html#AppendixJAVA
https://www.oracle.com/technetwork/security-advisory/cpuoct2018verbose-5170927.html#JAVA

CVE-2018-13785

Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Deployment (libpng)). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded.

Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs.

CVSS v3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
Comment 1 Alexander Bergmann 2018-10-19 06:39:27 UTC
Closing bug as we use system libpng.
Comment 4 Swamp Workflow Management 2019-01-09 20:11:56 UTC
SUSE-SU-2019:0049-1: An update that fixes 13 vulnerabilities is now available.

Category: security (important)
Bug References: 1101644,1101645,1101651,1101656,1112142,1112143,1112144,1112146,1112147,1112152,1112153
CVE References: CVE-2018-13785,CVE-2018-16435,CVE-2018-2938,CVE-2018-2940,CVE-2018-2952,CVE-2018-2973,CVE-2018-3136,CVE-2018-3139,CVE-2018-3149,CVE-2018-3169,CVE-2018-3180,CVE-2018-3214,CVE-2018-3639
Sources used:
SUSE OpenStack Cloud 7 (src):    java-1_7_0-openjdk-1.7.0.201-43.18.1
SUSE Linux Enterprise Server for SAP 12-SP2 (src):    java-1_7_0-openjdk-1.7.0.201-43.18.1
SUSE Linux Enterprise Server 12-SP4 (src):    java-1_7_0-openjdk-1.7.0.201-43.18.1
SUSE Linux Enterprise Server 12-SP3 (src):    java-1_7_0-openjdk-1.7.0.201-43.18.1
SUSE Linux Enterprise Server 12-SP2-LTSS (src):    java-1_7_0-openjdk-1.7.0.201-43.18.1
SUSE Linux Enterprise Server 12-SP2-BCL (src):    java-1_7_0-openjdk-1.7.0.201-43.18.1
SUSE Linux Enterprise Server 12-SP1-LTSS (src):    java-1_7_0-openjdk-1.7.0.201-43.18.1
SUSE Linux Enterprise Server 12-LTSS (src):    java-1_7_0-openjdk-1.7.0.201-43.18.1
SUSE Linux Enterprise Desktop 12-SP4 (src):    java-1_7_0-openjdk-1.7.0.201-43.18.1
SUSE Linux Enterprise Desktop 12-SP3 (src):    java-1_7_0-openjdk-1.7.0.201-43.18.1
SUSE Enterprise Storage 4 (src):    java-1_7_0-openjdk-1.7.0.201-43.18.1
Comment 5 Swamp Workflow Management 2019-01-10 20:14:20 UTC
SUSE-SU-2019:0057-1: An update that fixes 9 vulnerabilities is now available.

Category: security (important)
Bug References: 1112142,1112143,1112144,1112146,1112147,1112148,1112152,1112153
CVE References: CVE-2018-13785,CVE-2018-16435,CVE-2018-3136,CVE-2018-3139,CVE-2018-3149,CVE-2018-3169,CVE-2018-3180,CVE-2018-3183,CVE-2018-3214
Sources used:
SUSE OpenStack Cloud 7 (src):    java-1_8_0-openjdk-1.8.0.191-27.29.1
SUSE Linux Enterprise Server for SAP 12-SP2 (src):    java-1_8_0-openjdk-1.8.0.191-27.29.1
SUSE Linux Enterprise Server 12-SP4 (src):    java-1_8_0-openjdk-1.8.0.191-27.29.1
SUSE Linux Enterprise Server 12-SP3 (src):    java-1_8_0-openjdk-1.8.0.191-27.29.1
SUSE Linux Enterprise Server 12-SP2-LTSS (src):    java-1_8_0-openjdk-1.8.0.191-27.29.1
SUSE Linux Enterprise Server 12-SP2-BCL (src):    java-1_8_0-openjdk-1.8.0.191-27.29.1
SUSE Linux Enterprise Server 12-SP1-LTSS (src):    java-1_8_0-openjdk-1.8.0.191-27.29.1
SUSE Linux Enterprise Desktop 12-SP4 (src):    java-1_8_0-openjdk-1.8.0.191-27.29.1
SUSE Linux Enterprise Desktop 12-SP3 (src):    java-1_8_0-openjdk-1.8.0.191-27.29.1
SUSE Enterprise Storage 4 (src):    java-1_8_0-openjdk-1.8.0.191-27.29.1
Comment 6 Swamp Workflow Management 2019-01-10 20:16:21 UTC
SUSE-SU-2019:0058-1: An update that fixes 9 vulnerabilities is now available.

Category: security (important)
Bug References: 1112142,1112143,1112144,1112146,1112147,1112148,1112152,1112153
CVE References: CVE-2018-13785,CVE-2018-16435,CVE-2018-3136,CVE-2018-3139,CVE-2018-3149,CVE-2018-3169,CVE-2018-3180,CVE-2018-3183,CVE-2018-3214
Sources used:
SUSE Linux Enterprise Module for Packagehub Subpackages 15 (src):    java-1_8_0-openjdk-1.8.0.191-3.13.1
SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 (src):    java-1_8_0-openjdk-1.8.0.191-3.13.1
SUSE Linux Enterprise Module for Legacy Software 15 (src):    java-1_8_0-openjdk-1.8.0.191-3.13.1
Comment 7 Swamp Workflow Management 2019-01-12 02:11:32 UTC
openSUSE-SU-2019:0043-1: An update that fixes 9 vulnerabilities is now available.

Category: security (important)
Bug References: 1112142,1112143,1112144,1112146,1112147,1112148,1112152,1112153
CVE References: CVE-2018-13785,CVE-2018-16435,CVE-2018-3136,CVE-2018-3139,CVE-2018-3149,CVE-2018-3169,CVE-2018-3180,CVE-2018-3183,CVE-2018-3214
Sources used:
openSUSE Leap 42.3 (src):    java-1_8_0-openjdk-1.8.0.191-30.1
openSUSE Leap 15.0 (src):    java-1_8_0-openjdk-1.8.0.191-lp150.2.9.2
Comment 8 Swamp Workflow Management 2019-01-12 02:20:03 UTC
openSUSE-SU-2019:0042-1: An update that fixes 13 vulnerabilities is now available.

Category: security (important)
Bug References: 1101644,1101645,1101651,1101656,1112142,1112143,1112144,1112146,1112147,1112152,1112153
CVE References: CVE-2018-13785,CVE-2018-16435,CVE-2018-2938,CVE-2018-2940,CVE-2018-2952,CVE-2018-2973,CVE-2018-3136,CVE-2018-3139,CVE-2018-3149,CVE-2018-3169,CVE-2018-3180,CVE-2018-3214,CVE-2018-3639
Sources used:
openSUSE Leap 42.3 (src):    java-1_7_0-openjdk-1.7.0.201-54.1, java-1_7_0-openjdk-bootstrap-1.7.0.201-54.1
Comment 9 Swamp Workflow Management 2019-04-12 22:12:21 UTC
SUSE-SU-2019:0049-2: An update that fixes 13 vulnerabilities is now available.

Category: security (important)
Bug References: 1101644,1101645,1101651,1101656,1112142,1112143,1112144,1112146,1112147,1112152,1112153
CVE References: CVE-2018-13785,CVE-2018-16435,CVE-2018-2938,CVE-2018-2940,CVE-2018-2952,CVE-2018-2973,CVE-2018-3136,CVE-2018-3139,CVE-2018-3149,CVE-2018-3169,CVE-2018-3180,CVE-2018-3214,CVE-2018-3639
Sources used:
SUSE Linux Enterprise Server for SAP 12-SP1 (src):    java-1_7_0-openjdk-1.7.0.201-43.18.1

*** NOTE: This information is not intended to be used for external
    communication, because this may only be a partial fix.
    If you have questions please reach out to maintenance coordination.
Comment 10 Swamp Workflow Management 2019-04-27 22:10:26 UTC
SUSE-SU-2019:0057-2: An update that fixes 9 vulnerabilities is now available.

Category: security (important)
Bug References: 1112142,1112143,1112144,1112146,1112147,1112148,1112152,1112153
CVE References: CVE-2018-13785,CVE-2018-16435,CVE-2018-3136,CVE-2018-3139,CVE-2018-3149,CVE-2018-3169,CVE-2018-3180,CVE-2018-3183,CVE-2018-3214
Sources used:
SUSE Linux Enterprise Server for SAP 12-SP1 (src):    java-1_8_0-openjdk-1.8.0.191-27.29.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.