Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2018-2283

Опубликовано: 30 июл. 2018
Источник: oracle-oval
Платформа: Oracle Linux 6

Описание

ELSA-2018-2283: java-1.7.0-openjdk security update (MODERATE)

[1:1.7.0.191-2.6.15.4.0.1]

  • Update DISTRO_NAME in specfile

[1:1.7.0.191-2.6.15.4]

  • Bump to revised 2.6.15 tarball with PR3616 -notimestamp javadoc fix
  • Resolves: rhbz#1594249

[1:1.7.0.191-2.6.15.3]

  • Bump to revised 2.6.15 tarball with jdk7u191-b01
  • Resolves: rhbz#1594249

[1:1.7.0.191-2.6.15.2]

  • Fix hook to show hs_err*.log files on failures.
  • Resolves: rhbz#1594249

[1:1.7.0.191-2.6.15.2]

  • Fix requires/provides filters for internal libs. See RHBZ#1590796
  • Resolves: rhbz#1594249

[1:1.7.0.191-2.6.15.1]

  • Bump to revised 2.6.15 tarball with PR3604
  • Resolves: rhbz#1594249

[1:1.7.0.191-2.6.15.0]

  • Bump to 2.6.15 and u191b00.
  • Drop PR3608/RH1566890/CVE-2018-3639 patch now applied upstream.
  • Resolves: rhbz#1594249

[1:1.7.0.181-2.6.14.12]

  • Add hook to show hs_err*.log files on failures.
  • Resolves: rhbz#1594249

[1:1.7.0.181-2.6.14.12]

  • Introduce stapinstall variable to set SystemTap arch directory correctly (e.g. arm64 on aarch64)
  • ABS_JAVA_HOME_DIR is no longer used in the latest tapsets
  • Resolves: rhbz#1594249

[1:1.7.0.181-2.6.14.12]

  • Cleanup RH1566890 patch and differentiate from java-1.8.0-openjdk version.
  • Resolves: rhbz#1594249

[1:1.7.0.181-2.6.14.12]

  • jsa files changed to 444 to pass rpm verification
  • Add reg-ex for filtering private libraries' provides/requires.
  • Resolves: rhbz#1594249

[1:1.7.0.181-2.6.14.11]

  • Fix patch files to appease git apply --stat
  • Resolves: rhbz#1578551

Обновленные пакеты

Oracle Linux 6

Oracle Linux x86_64

java-1.7.0-openjdk

1.7.0.191-2.6.15.4.0.1.el6_10

java-1.7.0-openjdk-demo

1.7.0.191-2.6.15.4.0.1.el6_10

java-1.7.0-openjdk-devel

1.7.0.191-2.6.15.4.0.1.el6_10

java-1.7.0-openjdk-javadoc

1.7.0.191-2.6.15.4.0.1.el6_10

java-1.7.0-openjdk-src

1.7.0.191-2.6.15.4.0.1.el6_10

Oracle Linux i686

java-1.7.0-openjdk

1.7.0.191-2.6.15.4.0.1.el6_10

java-1.7.0-openjdk-demo

1.7.0.191-2.6.15.4.0.1.el6_10

java-1.7.0-openjdk-devel

1.7.0.191-2.6.15.4.0.1.el6_10

java-1.7.0-openjdk-javadoc

1.7.0.191-2.6.15.4.0.1.el6_10

java-1.7.0-openjdk-src

1.7.0.191-2.6.15.4.0.1.el6_10

Связанные CVE

Связанные уязвимости

CVSS3: 3.7
ubuntu
больше 7 лет назад

Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171; JRockit: R28.3.18. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:...

CVSS3: 3.7
redhat
больше 7 лет назад

Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171; JRockit: R28.3.18. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:...

CVSS3: 3.7
nvd
больше 7 лет назад

Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171; JRockit: R28.3.18. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/P

CVSS3: 3.7
debian
больше 7 лет назад

Vulnerability in the Java SE, Java SE Embedded, JRockit component of O ...

CVSS3: 3.7
github
больше 3 лет назад

Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171; JRockit: R28.3.18. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:...