- Issued:
- 2018-04-19
- Updated:
- 2018-04-19
RHSA-2018:1188 - Critical: java-1.8.0-openjdk security update
Synopsis
Critical: java-1.8.0-openjdk security update
Type/Severity
Security Advisory Critical
Topic
An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 6.
Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.
Security Fix(es):
-
OpenJDK: incorrect handling of Reference clones can lead to sandbox bypass (Hotspot, 8192025) (CVE-2018-2814)
-
OpenJDK: unrestricted deserialization of data from JCEKS key stores (Security, 8189997) (CVE-2018-2794)
-
OpenJDK: insufficient consistency checks in deserialization of multiple classes (Security, 8189977) (CVE-2018-2795)
-
OpenJDK: unbounded memory allocation during deserialization in PriorityBlockingQueue (Concurrency, 8189981) (CVE-2018-2796)
-
OpenJDK: unbounded memory allocation during deserialization in TabularDataSupport (JMX, 8189985) (CVE-2018-2797)
-
OpenJDK: unbounded memory allocation during deserialization in Container (AWT, 8189989) (CVE-2018-2798)
-
OpenJDK: unbounded memory allocation during deserialization in NamedNodeMapImpl (JAXP, 8189993) (CVE-2018-2799)
-
OpenJDK: RMI HTTP transport enabled by default (RMI, 8193833) (CVE-2018-2800)
-
OpenJDK: unbounded memory allocation during deserialization in StubIORImpl (Serialization, 8192757) (CVE-2018-2815)
-
OpenJDK: incorrect merging of sections in the JAR manifest (Security, 8189969) (CVE-2018-2790)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Note: If the web browser plug-in provided by the icedtea-web package was installed, the issues exposed via Java applets could have been exploited without user interaction if a user visited a malicious website.
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
All running instances of OpenJDK Java must be restarted for this update to take effect.
Affected Products
| Product | Version | Arch |
|---|---|---|
| Red Hat Enterprise Linux for Scientific Computing | 6 | x86_64 |
| Red Hat Enterprise Linux Workstation | 6 | x86_64 |
| Red Hat Enterprise Linux Workstation | 6 | i386 |
| Red Hat Enterprise Linux Server | 6 | x86_64 |
| Red Hat Enterprise Linux Server | 6 | i386 |
| Red Hat Enterprise Linux Server - Retired Extended Life Cycle Support | 6 | x86_64 |
| Red Hat Enterprise Linux Server - Extended Life Cycle Support | 6 | x86_64 |
| Red Hat Enterprise Linux Server - Extended Life Cycle Support | 6 | i386 |
| Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension | 6 | x86_64 |
| Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension | 6 | i386 |
| Red Hat Enterprise Linux Desktop | 6 | x86_64 |
| Red Hat Enterprise Linux Desktop | 6 | i386 |
Updated Packages
- java-1.8.0-openjdk-demo-1.8.0.171-3.b10.el6_9.i686.rpm
- java-1.8.0-openjdk-1.8.0.171-3.b10.el6_9.i686.rpm
- java-1.8.0-openjdk-debug-1.8.0.171-3.b10.el6_9.i686.rpm
- java-1.8.0-openjdk-headless-debug-1.8.0.171-3.b10.el6_9.i686.rpm
- java-1.8.0-openjdk-demo-debug-1.8.0.171-3.b10.el6_9.x86_64.rpm
- java-1.8.0-openjdk-headless-debug-1.8.0.171-3.b10.el6_9.x86_64.rpm
- java-1.8.0-openjdk-src-1.8.0.171-3.b10.el6_9.i686.rpm
- java-1.8.0-openjdk-headless-1.8.0.171-3.b10.el6_9.i686.rpm
- java-1.8.0-openjdk-src-1.8.0.171-3.b10.el6_9.x86_64.rpm
- java-1.8.0-openjdk-devel-debug-1.8.0.171-3.b10.el6_9.x86_64.rpm
- java-1.8.0-openjdk-devel-1.8.0.171-3.b10.el6_9.x86_64.rpm
- java-1.8.0-openjdk-src-debug-1.8.0.171-3.b10.el6_9.i686.rpm
- java-1.8.0-openjdk-src-debug-1.8.0.171-3.b10.el6_9.x86_64.rpm
- java-1.8.0-openjdk-demo-debug-1.8.0.171-3.b10.el6_9.i686.rpm
- java-1.8.0-openjdk-1.8.0.171-3.b10.el6_9.x86_64.rpm
- java-1.8.0-openjdk-debuginfo-1.8.0.171-3.b10.el6_9.i686.rpm
- java-1.8.0-openjdk-1.8.0.171-3.b10.el6_9.src.rpm
- java-1.8.0-openjdk-demo-1.8.0.171-3.b10.el6_9.x86_64.rpm
- java-1.8.0-openjdk-javadoc-1.8.0.171-3.b10.el6_9.noarch.rpm
- java-1.8.0-openjdk-devel-debug-1.8.0.171-3.b10.el6_9.i686.rpm
- java-1.8.0-openjdk-debuginfo-1.8.0.171-3.b10.el6_9.x86_64.rpm
- java-1.8.0-openjdk-devel-1.8.0.171-3.b10.el6_9.i686.rpm
- java-1.8.0-openjdk-javadoc-debug-1.8.0.171-3.b10.el6_9.noarch.rpm
- java-1.8.0-openjdk-debug-1.8.0.171-3.b10.el6_9.x86_64.rpm
- java-1.8.0-openjdk-headless-1.8.0.171-3.b10.el6_9.x86_64.rpm
Fixes
- This content is not included.BZ - 1567121
- This content is not included.BZ - 1567126
- This content is not included.BZ - 1567351
- This content is not included.BZ - 1567537
- This content is not included.BZ - 1567542
- This content is not included.BZ - 1567543
- This content is not included.BZ - 1567545
- This content is not included.BZ - 1567546
- This content is not included.BZ - 1568163
- This content is not included.BZ - 1568515
CVEs
- CVE-2018-2790
- CVE-2018-2794
- CVE-2018-2795
- CVE-2018-2796
- CVE-2018-2797
- CVE-2018-2798
- CVE-2018-2799
- CVE-2018-2800
- CVE-2018-2814
- CVE-2018-2815
References
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.