Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2019-0464

Опубликовано: 05 мар. 2019
Источник: oracle-oval
Платформа: Oracle Linux 7

Описание

ELSA-2019-0464: java-1.7.0-openjdk security update (MODERATE)

[1:1.7.0.211-2.6.17.1.0.1]

  • Update DISTRO_NAME in specfile

[1:1.7.0.211-2.6.17.1]

  • Produce debug symbols for libpulse-java.so
  • Set IT_CFLAGS=-g so that debug symbols for the pulse audio
  • native library are being produced. This is needed to fix
  • rpmdiff errors of missing .debug_info in pulse-java.so.debug.
  • Resolves: rhbz#1661577

[1:1.7.0.211-2.6.17.0]

  • Bump to 2.6.17.
  • Adjust jdk8076221-pr2809-disable_rc4_cipher_suites.patch to apply after 8211883
  • Regenerate pr3393-rh1273760-support_rsaandmgf1_with_sha_in_pkcs11.patch against current sources
  • Resolves: rhbz#1661577

[1:1.7.0.201-2.6.17pre01.0]

  • Bump to 2.6.17pre01.
  • Add support for icedtea_snapshot so we can build pre-releases.
  • Resolves: rhbz#1661577

Обновленные пакеты

Oracle Linux 7

Oracle Linux aarch64

java-1.7.0-openjdk

1.7.0.211-2.6.17.1.0.1.el7_6

java-1.7.0-openjdk-accessibility

1.7.0.211-2.6.17.1.0.1.el7_6

java-1.7.0-openjdk-demo

1.7.0.211-2.6.17.1.0.1.el7_6

java-1.7.0-openjdk-devel

1.7.0.211-2.6.17.1.0.1.el7_6

java-1.7.0-openjdk-headless

1.7.0.211-2.6.17.1.0.1.el7_6

java-1.7.0-openjdk-javadoc

1.7.0.211-2.6.17.1.0.1.el7_6

java-1.7.0-openjdk-src

1.7.0.211-2.6.17.1.0.1.el7_6

Oracle Linux x86_64

java-1.7.0-openjdk

1.7.0.211-2.6.17.1.0.1.el7_6

java-1.7.0-openjdk-accessibility

1.7.0.211-2.6.17.1.0.1.el7_6

java-1.7.0-openjdk-demo

1.7.0.211-2.6.17.1.0.1.el7_6

java-1.7.0-openjdk-devel

1.7.0.211-2.6.17.1.0.1.el7_6

java-1.7.0-openjdk-headless

1.7.0.211-2.6.17.1.0.1.el7_6

java-1.7.0-openjdk-javadoc

1.7.0.211-2.6.17.1.0.1.el7_6

java-1.7.0-openjdk-src

1.7.0.211-2.6.17.1.0.1.el7_6

Связанные CVE

Связанные уязвимости

CVSS3: 3.1
ubuntu
почти 7 лет назад

Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiali...

CVSS3: 3.1
redhat
почти 7 лет назад

Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiali...

CVSS3: 3.1
nvd
почти 7 лет назад

Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality

CVSS3: 3.1
debian
почти 7 лет назад

Vulnerability in the Java SE component of Oracle Java SE (subcomponent ...

CVSS3: 3.1
github
больше 3 лет назад

Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiali...