Mehrere Probleme in java-1.7.0-oracle
ID: | RHSA-2018:2255-01 |
Distribution: | Red Hat |
Plattformen: | Red Hat Oracle Java for Red Hat Enterprise Linux |
Datum: | Di, 24. Juli 2018, 23:52 |
Referenzen: | https://access.redhat.com/security/cve/CVE-2018-2973
https://access.redhat.com/security/cve/CVE-2018-2952 https://access.redhat.com/security/cve/CVE-2018-2940 https://access.redhat.com/security/cve/CVE-2018-2941 |
Applikationen: | Oracle JDK |
Originalnachricht |
|
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Critical: java-1.7.0-oracle security update Advisory ID: RHSA-2018:2255-01 Product: Oracle Java for Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2018:2255 Issue date: 2018-07-24 CVE Names: CVE-2018-2940 CVE-2018-2941 CVE-2018-2952 CVE-2018-2973 ===================================================================== 1. Summary: An update for java-1.7.0-oracle is now available for Oracle Java for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Oracle Java for Red Hat Enterprise Linux Desktop 6 - i386, x86_64 Oracle Java for Red Hat Enterprise Linux HPC Node 6 - x86_64 Oracle Java for Red Hat Enterprise Linux Server 6 - i386, x86_64 Oracle Java for Red Hat Enterprise Linux Workstation 6 - i386, x86_64 3. Description: Oracle Java SE version 7 includes the Oracle Java Runtime Environment and the Oracle Java Software Development Kit. This update upgrades Oracle Java SE 7 to version 7 Update 191. Security Fix(es): * Oracle JDK: unspecified vulnerability fixed in 7u191, 8u181, and 10.0.2 (JavaFX) (CVE-2018-2941) * Oracle JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (Libraries) (CVE-2018-2940) * OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547) (CVE-2018-2952) * Oracle JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (JSSE) (CVE-2018-2973) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 All running instances of Oracle Java must be restarted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1600925 - CVE-2018-2952 OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547) 1602143 - CVE-2018-2941 Oracle JDK: unspecified vulnerability fixed in 7u191, 8u181, and 10.0.2 (JavaFX) 1602145 - CVE-2018-2973 Oracle JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (JSSE) 1602146 - CVE-2018-2940 Oracle JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (Libraries) 6. Package List: Oracle Java for Red Hat Enterprise Linux Desktop 6: i386: java-1.7.0-oracle-1.7.0.191-1jpp.1.el6.i686.rpm java-1.7.0-oracle-devel-1.7.0.191-1jpp.1.el6.i686.rpm java-1.7.0-oracle-javafx-1.7.0.191-1jpp.1.el6.i686.rpm java-1.7.0-oracle-jdbc-1.7.0.191-1jpp.1.el6.i686.rpm java-1.7.0-oracle-plugin-1.7.0.191-1jpp.1.el6.i686.rpm java-1.7.0-oracle-src-1.7.0.191-1jpp.1.el6.i686.rpm x86_64: java-1.7.0-oracle-1.7.0.191-1jpp.1.el6.x86_64.rpm java-1.7.0-oracle-devel-1.7.0.191-1jpp.1.el6.x86_64.rpm java-1.7.0-oracle-javafx-1.7.0.191-1jpp.1.el6.x86_64.rpm java-1.7.0-oracle-jdbc-1.7.0.191-1jpp.1.el6.x86_64.rpm java-1.7.0-oracle-plugin-1.7.0.191-1jpp.1.el6.x86_64.rpm java-1.7.0-oracle-src-1.7.0.191-1jpp.1.el6.x86_64.rpm Oracle Java for Red Hat Enterprise Linux HPC Node 6: x86_64: java-1.7.0-oracle-1.7.0.191-1jpp.1.el6.x86_64.rpm java-1.7.0-oracle-devel-1.7.0.191-1jpp.1.el6.x86_64.rpm java-1.7.0-oracle-javafx-1.7.0.191-1jpp.1.el6.x86_64.rpm java-1.7.0-oracle-jdbc-1.7.0.191-1jpp.1.el6.x86_64.rpm java-1.7.0-oracle-plugin-1.7.0.191-1jpp.1.el6.x86_64.rpm java-1.7.0-oracle-src-1.7.0.191-1jpp.1.el6.x86_64.rpm Oracle Java for Red Hat Enterprise Linux Server 6: i386: java-1.7.0-oracle-1.7.0.191-1jpp.1.el6.i686.rpm java-1.7.0-oracle-devel-1.7.0.191-1jpp.1.el6.i686.rpm java-1.7.0-oracle-javafx-1.7.0.191-1jpp.1.el6.i686.rpm java-1.7.0-oracle-jdbc-1.7.0.191-1jpp.1.el6.i686.rpm java-1.7.0-oracle-plugin-1.7.0.191-1jpp.1.el6.i686.rpm java-1.7.0-oracle-src-1.7.0.191-1jpp.1.el6.i686.rpm x86_64: java-1.7.0-oracle-1.7.0.191-1jpp.1.el6.x86_64.rpm java-1.7.0-oracle-devel-1.7.0.191-1jpp.1.el6.x86_64.rpm java-1.7.0-oracle-javafx-1.7.0.191-1jpp.1.el6.x86_64.rpm java-1.7.0-oracle-jdbc-1.7.0.191-1jpp.1.el6.x86_64.rpm java-1.7.0-oracle-plugin-1.7.0.191-1jpp.1.el6.x86_64.rpm java-1.7.0-oracle-src-1.7.0.191-1jpp.1.el6.x86_64.rpm Oracle Java for Red Hat Enterprise Linux Workstation 6: i386: java-1.7.0-oracle-1.7.0.191-1jpp.1.el6.i686.rpm java-1.7.0-oracle-devel-1.7.0.191-1jpp.1.el6.i686.rpm java-1.7.0-oracle-javafx-1.7.0.191-1jpp.1.el6.i686.rpm java-1.7.0-oracle-jdbc-1.7.0.191-1jpp.1.el6.i686.rpm java-1.7.0-oracle-plugin-1.7.0.191-1jpp.1.el6.i686.rpm java-1.7.0-oracle-src-1.7.0.191-1jpp.1.el6.i686.rpm x86_64: java-1.7.0-oracle-1.7.0.191-1jpp.1.el6.x86_64.rpm java-1.7.0-oracle-devel-1.7.0.191-1jpp.1.el6.x86_64.rpm java-1.7.0-oracle-javafx-1.7.0.191-1jpp.1.el6.x86_64.rpm java-1.7.0-oracle-jdbc-1.7.0.191-1jpp.1.el6.x86_64.rpm java-1.7.0-oracle-plugin-1.7.0.191-1jpp.1.el6.x86_64.rpm java-1.7.0-oracle-src-1.7.0.191-1jpp.1.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2018-2940 https://access.redhat.com/security/cve/CVE-2018-2941 https://access.redhat.com/security/cve/CVE-2018-2952 https://access.redhat.com/security/cve/CVE-2018-2973 https://access.redhat.com/security/updates/classification/#critical 8. Contact: The Red Hat security contact is |