Описание
ELSA-2018-1650: java-1.8.0-openjdk security update (IMPORTANT)
[1:1.8.0.171-8.b10]
- added and applied 1566890_embargoed20180521.patch
- Resolves: rhbz#1578545
Обновленные пакеты
Oracle Linux 6
Oracle Linux x86_64
java-1.8.0-openjdk
1.8.0.171-8.b10.el6_9
java-1.8.0-openjdk-debug
1.8.0.171-8.b10.el6_9
java-1.8.0-openjdk-demo
1.8.0.171-8.b10.el6_9
java-1.8.0-openjdk-demo-debug
1.8.0.171-8.b10.el6_9
java-1.8.0-openjdk-devel
1.8.0.171-8.b10.el6_9
java-1.8.0-openjdk-devel-debug
1.8.0.171-8.b10.el6_9
java-1.8.0-openjdk-headless
1.8.0.171-8.b10.el6_9
java-1.8.0-openjdk-headless-debug
1.8.0.171-8.b10.el6_9
java-1.8.0-openjdk-javadoc
1.8.0.171-8.b10.el6_9
java-1.8.0-openjdk-javadoc-debug
1.8.0.171-8.b10.el6_9
java-1.8.0-openjdk-src
1.8.0.171-8.b10.el6_9
java-1.8.0-openjdk-src-debug
1.8.0.171-8.b10.el6_9
Oracle Linux i686
java-1.8.0-openjdk
1.8.0.171-8.b10.el6_9
java-1.8.0-openjdk-debug
1.8.0.171-8.b10.el6_9
java-1.8.0-openjdk-demo
1.8.0.171-8.b10.el6_9
java-1.8.0-openjdk-demo-debug
1.8.0.171-8.b10.el6_9
java-1.8.0-openjdk-devel
1.8.0.171-8.b10.el6_9
java-1.8.0-openjdk-devel-debug
1.8.0.171-8.b10.el6_9
java-1.8.0-openjdk-headless
1.8.0.171-8.b10.el6_9
java-1.8.0-openjdk-headless-debug
1.8.0.171-8.b10.el6_9
java-1.8.0-openjdk-javadoc
1.8.0.171-8.b10.el6_9
java-1.8.0-openjdk-javadoc-debug
1.8.0.171-8.b10.el6_9
java-1.8.0-openjdk-src
1.8.0.171-8.b10.el6_9
java-1.8.0-openjdk-src-debug
1.8.0.171-8.b10.el6_9
Связанные CVE
Связанные уязвимости
Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.
Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.
Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.
Systems with microprocessors utilizing speculative execution and specu ...