Описание
ELSA-2019-0464: java-1.7.0-openjdk security update (MODERATE)
[1:1.7.0.211-2.6.17.1.0.1]
- Update DISTRO_NAME in specfile
[1:1.7.0.211-2.6.17.1]
- Produce debug symbols for libpulse-java.so
- Set IT_CFLAGS=-g so that debug symbols for the pulse audio
- native library are being produced. This is needed to fix
- rpmdiff errors of missing .debug_info in pulse-java.so.debug.
- Resolves: rhbz#1661577
[1:1.7.0.211-2.6.17.0]
- Bump to 2.6.17.
- Adjust jdk8076221-pr2809-disable_rc4_cipher_suites.patch to apply after 8211883
- Regenerate pr3393-rh1273760-support_rsaandmgf1_with_sha_in_pkcs11.patch against current sources
- Resolves: rhbz#1661577
[1:1.7.0.201-2.6.17pre01.0]
- Bump to 2.6.17pre01.
- Add support for icedtea_snapshot so we can build pre-releases.
- Resolves: rhbz#1661577
Обновленные пакеты
Oracle Linux 7
Oracle Linux aarch64
java-1.7.0-openjdk
1.7.0.211-2.6.17.1.0.1.el7_6
java-1.7.0-openjdk-accessibility
1.7.0.211-2.6.17.1.0.1.el7_6
java-1.7.0-openjdk-demo
1.7.0.211-2.6.17.1.0.1.el7_6
java-1.7.0-openjdk-devel
1.7.0.211-2.6.17.1.0.1.el7_6
java-1.7.0-openjdk-headless
1.7.0.211-2.6.17.1.0.1.el7_6
java-1.7.0-openjdk-javadoc
1.7.0.211-2.6.17.1.0.1.el7_6
java-1.7.0-openjdk-src
1.7.0.211-2.6.17.1.0.1.el7_6
Oracle Linux x86_64
java-1.7.0-openjdk
1.7.0.211-2.6.17.1.0.1.el7_6
java-1.7.0-openjdk-accessibility
1.7.0.211-2.6.17.1.0.1.el7_6
java-1.7.0-openjdk-demo
1.7.0.211-2.6.17.1.0.1.el7_6
java-1.7.0-openjdk-devel
1.7.0.211-2.6.17.1.0.1.el7_6
java-1.7.0-openjdk-headless
1.7.0.211-2.6.17.1.0.1.el7_6
java-1.7.0-openjdk-javadoc
1.7.0.211-2.6.17.1.0.1.el7_6
java-1.7.0-openjdk-src
1.7.0.211-2.6.17.1.0.1.el7_6
Связанные CVE
Связанные уязвимости
Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiali...
Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiali...
Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality
Vulnerability in the Java SE component of Oracle Java SE (subcomponent ...
Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiali...