Issued:
2018-04-19
Updated:
2018-04-19

RHSA-2018:1188 - Critical: java-1.8.0-openjdk security update


Synopsis

Critical: java-1.8.0-openjdk security update

Type/Severity

Security Advisory Critical

Topic

An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 6.

Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.

Security Fix(es):

  • OpenJDK: incorrect handling of Reference clones can lead to sandbox bypass (Hotspot, 8192025) (CVE-2018-2814)

  • OpenJDK: unrestricted deserialization of data from JCEKS key stores (Security, 8189997) (CVE-2018-2794)

  • OpenJDK: insufficient consistency checks in deserialization of multiple classes (Security, 8189977) (CVE-2018-2795)

  • OpenJDK: unbounded memory allocation during deserialization in PriorityBlockingQueue (Concurrency, 8189981) (CVE-2018-2796)

  • OpenJDK: unbounded memory allocation during deserialization in TabularDataSupport (JMX, 8189985) (CVE-2018-2797)

  • OpenJDK: unbounded memory allocation during deserialization in Container (AWT, 8189989) (CVE-2018-2798)

  • OpenJDK: unbounded memory allocation during deserialization in NamedNodeMapImpl (JAXP, 8189993) (CVE-2018-2799)

  • OpenJDK: RMI HTTP transport enabled by default (RMI, 8193833) (CVE-2018-2800)

  • OpenJDK: unbounded memory allocation during deserialization in StubIORImpl (Serialization, 8192757) (CVE-2018-2815)

  • OpenJDK: incorrect merging of sections in the JAR manifest (Security, 8189969) (CVE-2018-2790)

For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.

Note: If the web browser plug-in provided by the icedtea-web package was installed, the issues exposed via Java applets could have been exploited without user interaction if a user visited a malicious website.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

All running instances of OpenJDK Java must be restarted for this update to take effect.

Affected Products

ProductVersionArch
Red Hat Enterprise Linux for Scientific Computing6x86_64
Red Hat Enterprise Linux Workstation6x86_64
Red Hat Enterprise Linux Workstation6i386
Red Hat Enterprise Linux Server6x86_64
Red Hat Enterprise Linux Server6i386
Red Hat Enterprise Linux Server - Retired Extended Life Cycle Support6x86_64
Red Hat Enterprise Linux Server - Extended Life Cycle Support6x86_64
Red Hat Enterprise Linux Server - Extended Life Cycle Support6i386
Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension6x86_64
Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension6i386
Red Hat Enterprise Linux Desktop6x86_64
Red Hat Enterprise Linux Desktop6i386

Updated Packages

  • java-1.8.0-openjdk-demo-1.8.0.171-3.b10.el6_9.i686.rpm
  • java-1.8.0-openjdk-1.8.0.171-3.b10.el6_9.i686.rpm
  • java-1.8.0-openjdk-debug-1.8.0.171-3.b10.el6_9.i686.rpm
  • java-1.8.0-openjdk-headless-debug-1.8.0.171-3.b10.el6_9.i686.rpm
  • java-1.8.0-openjdk-demo-debug-1.8.0.171-3.b10.el6_9.x86_64.rpm
  • java-1.8.0-openjdk-headless-debug-1.8.0.171-3.b10.el6_9.x86_64.rpm
  • java-1.8.0-openjdk-src-1.8.0.171-3.b10.el6_9.i686.rpm
  • java-1.8.0-openjdk-headless-1.8.0.171-3.b10.el6_9.i686.rpm
  • java-1.8.0-openjdk-src-1.8.0.171-3.b10.el6_9.x86_64.rpm
  • java-1.8.0-openjdk-devel-debug-1.8.0.171-3.b10.el6_9.x86_64.rpm
  • java-1.8.0-openjdk-devel-1.8.0.171-3.b10.el6_9.x86_64.rpm
  • java-1.8.0-openjdk-src-debug-1.8.0.171-3.b10.el6_9.i686.rpm
  • java-1.8.0-openjdk-src-debug-1.8.0.171-3.b10.el6_9.x86_64.rpm
  • java-1.8.0-openjdk-demo-debug-1.8.0.171-3.b10.el6_9.i686.rpm
  • java-1.8.0-openjdk-1.8.0.171-3.b10.el6_9.x86_64.rpm
  • java-1.8.0-openjdk-debuginfo-1.8.0.171-3.b10.el6_9.i686.rpm
  • java-1.8.0-openjdk-1.8.0.171-3.b10.el6_9.src.rpm
  • java-1.8.0-openjdk-demo-1.8.0.171-3.b10.el6_9.x86_64.rpm
  • java-1.8.0-openjdk-javadoc-1.8.0.171-3.b10.el6_9.noarch.rpm
  • java-1.8.0-openjdk-devel-debug-1.8.0.171-3.b10.el6_9.i686.rpm
  • java-1.8.0-openjdk-debuginfo-1.8.0.171-3.b10.el6_9.x86_64.rpm
  • java-1.8.0-openjdk-devel-1.8.0.171-3.b10.el6_9.i686.rpm
  • java-1.8.0-openjdk-javadoc-debug-1.8.0.171-3.b10.el6_9.noarch.rpm
  • java-1.8.0-openjdk-debug-1.8.0.171-3.b10.el6_9.x86_64.rpm
  • java-1.8.0-openjdk-headless-1.8.0.171-3.b10.el6_9.x86_64.rpm

Fixes

CVEs

References


Additional information