Описание
ELSA-2019-0416: java-1.8.0-openjdk security update (MODERATE)
[1:1.8.0.201.b09-0]
- Update to aarch64-shenandoah-jdk8u201-b09.
- Resolves: rhbz#1661577
[1:1.8.0.192.b12-1]
- Add 8160748 for AArch64 which is missing from upstream 8u version.
- Add port of 8189170 to AArch64 which is missing from upstream 8u version.
- Resolves: rhbz#1661577
[1:1.8.0.192.b12-0]
- Update to aarch64-shenandoah-jdk8u192-b12.
- Remove patches included upstream
- PR3548/RH1540242
- JDK-6260348/PR3066
- JDK-8185723/PR3553
- JDK-8186461/PR3557
- JDK-8201509/PR3579
- JDK-8205104/PR3539/RH1548475
- JDK-8206406/PR3610/RH1597825
- JDK-8201495/PR2415
- Re-generate patches (mostly due to upstream build changes)
- JDK-8073139/PR1758/RH1191652
- JDK-8197429/PR3546/RH1536622 (due to JDK-8189170)
- JDK-8199936/PR3533
- JDK-8199936/PR3591
- PR3559 (due to JDK-8185723/JDK-8186461/JDK-8201509)
- PR3593 (due to JDK-8081202)
- RH1566890/CVE-2018-3639 (due to JDK-8189170)
- RH1649664 (due to JDK-8196516)
- RH1649731
- Resolves: rhbz#1661577
[1:1.8.0.191.b14-1]
- Add 8131048 & 8164920 (PR3574/RH1498936) to provide a CRC32 intrinsic for PPC64.
- Resolves: rhbz#1661577
[1:1.8.0.191.b14-0]
- Update to aarch64-shenandoah-jdk8u191-b14.
- Adjust JDK-8073139/PR1758/RH1191652 to apply following 8155627 backport.
- Resolves: rhbz#1661577
[1:1.8.0.191.b13-0]
- Update to aarch64-shenandoah-jdk8u191-b13.
- Update tarball generation script in preparation for PR3667/RH1656676 SunEC changes.
- Use remove-intree-libraries.sh to remove the remaining SunEC code for now.
- Resolves: rhbz#1661577
Обновленные пакеты
Oracle Linux 6
Oracle Linux x86_64
java-1.8.0-openjdk
1.8.0.201.b09-1.el6_10
java-1.8.0-openjdk-debug
1.8.0.201.b09-1.el6_10
java-1.8.0-openjdk-demo
1.8.0.201.b09-1.el6_10
java-1.8.0-openjdk-demo-debug
1.8.0.201.b09-1.el6_10
java-1.8.0-openjdk-devel
1.8.0.201.b09-1.el6_10
java-1.8.0-openjdk-devel-debug
1.8.0.201.b09-1.el6_10
java-1.8.0-openjdk-headless
1.8.0.201.b09-1.el6_10
java-1.8.0-openjdk-headless-debug
1.8.0.201.b09-1.el6_10
java-1.8.0-openjdk-javadoc
1.8.0.201.b09-1.el6_10
java-1.8.0-openjdk-javadoc-debug
1.8.0.201.b09-1.el6_10
java-1.8.0-openjdk-src
1.8.0.201.b09-1.el6_10
java-1.8.0-openjdk-src-debug
1.8.0.201.b09-1.el6_10
Oracle Linux i686
java-1.8.0-openjdk
1.8.0.201.b09-1.el6_10
java-1.8.0-openjdk-debug
1.8.0.201.b09-1.el6_10
java-1.8.0-openjdk-demo
1.8.0.201.b09-1.el6_10
java-1.8.0-openjdk-demo-debug
1.8.0.201.b09-1.el6_10
java-1.8.0-openjdk-devel
1.8.0.201.b09-1.el6_10
java-1.8.0-openjdk-devel-debug
1.8.0.201.b09-1.el6_10
java-1.8.0-openjdk-headless
1.8.0.201.b09-1.el6_10
java-1.8.0-openjdk-headless-debug
1.8.0.201.b09-1.el6_10
java-1.8.0-openjdk-javadoc
1.8.0.201.b09-1.el6_10
java-1.8.0-openjdk-javadoc-debug
1.8.0.201.b09-1.el6_10
java-1.8.0-openjdk-src
1.8.0.201.b09-1.el6_10
java-1.8.0-openjdk-src-debug
1.8.0.201.b09-1.el6_10
Связанные CVE
Связанные уязвимости
Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiali...
Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiali...
Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality
Vulnerability in the Java SE component of Oracle Java SE (subcomponent ...
Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiali...