- Issued:
- 2018-04-19
- Updated:
- 2018-04-19
RHSA-2018:1191 - Critical: java-1.8.0-openjdk security update
Synopsis
Critical: java-1.8.0-openjdk security update
Type/Severity
Security Advisory Critical
Topic
An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.
Security Fix(es):
-
OpenJDK: incorrect handling of Reference clones can lead to sandbox bypass (Hotspot, 8192025) (CVE-2018-2814)
-
OpenJDK: unrestricted deserialization of data from JCEKS key stores (Security, 8189997) (CVE-2018-2794)
-
OpenJDK: insufficient consistency checks in deserialization of multiple classes (Security, 8189977) (CVE-2018-2795)
-
OpenJDK: unbounded memory allocation during deserialization in PriorityBlockingQueue (Concurrency, 8189981) (CVE-2018-2796)
-
OpenJDK: unbounded memory allocation during deserialization in TabularDataSupport (JMX, 8189985) (CVE-2018-2797)
-
OpenJDK: unbounded memory allocation during deserialization in Container (AWT, 8189989) (CVE-2018-2798)
-
OpenJDK: unbounded memory allocation during deserialization in NamedNodeMapImpl (JAXP, 8189993) (CVE-2018-2799)
-
OpenJDK: RMI HTTP transport enabled by default (RMI, 8193833) (CVE-2018-2800)
-
OpenJDK: unbounded memory allocation during deserialization in StubIORImpl (Serialization, 8192757) (CVE-2018-2815)
-
OpenJDK: incorrect merging of sections in the JAR manifest (Security, 8189969) (CVE-2018-2790)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Note: If the web browser plug-in provided by the icedtea-web package was installed, the issues exposed via Java applets could have been exploited without user interaction if a user visited a malicious website.
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
All running instances of OpenJDK Java must be restarted for this update to take effect.
Affected Products
| Product | Version | Arch |
|---|---|---|
| Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions | 7.7 | x86_64 |
| Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions | 7.6 | x86_64 |
| Red Hat Enterprise Linux for x86_64 - Extended Update Support | 7.7 | x86_64 |
| Red Hat Enterprise Linux for x86_64 - Extended Update Support | 7.6 | x86_64 |
| Red Hat Enterprise Linux for x86_64 - Extended Update Support | 7.5 | x86_64 |
| Red Hat Enterprise Linux for Scientific Computing | 7 | x86_64 |
| Red Hat Enterprise Linux for Power, little endian | 7 | ppc64le |
| Red Hat Enterprise Linux for Power, little endian - Extended Update Support | 7.7 | ppc64le |
| Red Hat Enterprise Linux for Power, little endian - Extended Update Support | 7.6 | ppc64le |
| Red Hat Enterprise Linux for Power, little endian - Extended Update Support | 7.5 | ppc64le |
| Red Hat Enterprise Linux for Power, big endian | 7 | ppc64 |
| Red Hat Enterprise Linux for Power, big endian - Extended Update Support | 7.7 | ppc64 |
| Red Hat Enterprise Linux for Power, big endian - Extended Update Support | 7.6 | ppc64 |
| Red Hat Enterprise Linux for Power, big endian - Extended Update Support | 7.5 | ppc64 |
| Red Hat Enterprise Linux for Power 9 | 7 | ppc64le |
| Red Hat Enterprise Linux for IBM z Systems | 7 | s390x |
| Red Hat Enterprise Linux for IBM z Systems - Extended Update Support | 7.7 | s390x |
| Red Hat Enterprise Linux for IBM z Systems - Extended Update Support | 7.6 | s390x |
| Red Hat Enterprise Linux for IBM z Systems - Extended Update Support | 7.5 | s390x |
| Red Hat Enterprise Linux for IBM System z (Structure A) | 7 | s390x |
| Red Hat Enterprise Linux for ARM 64 | 7 | aarch64 |
| Red Hat Enterprise Linux Workstation | 7 | x86_64 |
| Red Hat Enterprise Linux Server | 7 | x86_64 |
| Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions | 7.7 | ppc64le |
| Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions | 7.6 | ppc64le |
| Red Hat Enterprise Linux Server - TUS | 7.7 | x86_64 |
| Red Hat Enterprise Linux Server - TUS | 7.6 | x86_64 |
| Red Hat Enterprise Linux Server - Extended Life Cycle Support | 7 | x86_64 |
| Red Hat Enterprise Linux Server - Extended Life Cycle Support for IBM Power, little endian | 7 | ppc64le |
| Red Hat Enterprise Linux Server - Extended Life Cycle Support for IBM Power, big endian | 7 | ppc64 |
| Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) | 7 | s390x |
| Red Hat Enterprise Linux Server - AUS | 7.7 | x86_64 |
| Red Hat Enterprise Linux Server - AUS | 7.6 | x86_64 |
| Red Hat Enterprise Linux EUS Compute Node | 7.7 | x86_64 |
| Red Hat Enterprise Linux EUS Compute Node | 7.6 | x86_64 |
| Red Hat Enterprise Linux EUS Compute Node | 7.5 | x86_64 |
| Red Hat Enterprise Linux Desktop | 7 | x86_64 |
Updated Packages
- java-1.8.0-openjdk-demo-1.8.0.171-7.b10.el7.ppc64.rpm
- java-1.8.0-openjdk-debug-1.8.0.171-7.b10.el7.i686.rpm
- java-1.8.0-openjdk-javadoc-debug-1.8.0.171-7.b10.el7.noarch.rpm
- java-1.8.0-openjdk-src-1.8.0.171-7.b10.el7.aarch64.rpm
- java-1.8.0-openjdk-accessibility-1.8.0.171-7.b10.el7.s390x.rpm
- java-1.8.0-openjdk-src-1.8.0.171-7.b10.el7.ppc64.rpm
- java-1.8.0-openjdk-devel-debug-1.8.0.171-7.b10.el7.x86_64.rpm
- java-1.8.0-openjdk-headless-1.8.0.171-7.b10.el7.ppc64.rpm
- java-1.8.0-openjdk-src-debug-1.8.0.171-7.b10.el7.ppc64le.rpm
- java-1.8.0-openjdk-headless-debug-1.8.0.171-7.b10.el7.i686.rpm
- java-1.8.0-openjdk-src-1.8.0.171-7.b10.el7.i686.rpm
- java-1.8.0-openjdk-1.8.0.171-7.b10.el7.src.rpm
- java-1.8.0-openjdk-accessibility-1.8.0.171-7.b10.el7.x86_64.rpm
- java-1.8.0-openjdk-demo-1.8.0.171-7.b10.el7.ppc64le.rpm
- java-1.8.0-openjdk-demo-1.8.0.171-7.b10.el7.i686.rpm
- java-1.8.0-openjdk-demo-debug-1.8.0.171-7.b10.el7.x86_64.rpm
- java-1.8.0-openjdk-debuginfo-1.8.0.171-7.b10.el7.aarch64.rpm
- java-1.8.0-openjdk-accessibility-debug-1.8.0.171-7.b10.el7.aarch64.rpm
- java-1.8.0-openjdk-accessibility-debug-1.8.0.171-7.b10.el7.i686.rpm
- java-1.8.0-openjdk-1.8.0.171-7.b10.el7.s390x.rpm
- java-1.8.0-openjdk-devel-debug-1.8.0.171-7.b10.el7.aarch64.rpm
- java-1.8.0-openjdk-accessibility-debug-1.8.0.171-7.b10.el7.ppc64le.rpm
- java-1.8.0-openjdk-devel-debug-1.8.0.171-7.b10.el7.ppc64.rpm
- java-1.8.0-openjdk-headless-1.8.0.171-7.b10.el7.i686.rpm
- java-1.8.0-openjdk-accessibility-1.8.0.171-7.b10.el7.ppc64.rpm
- java-1.8.0-openjdk-src-1.8.0.171-7.b10.el7.ppc64le.rpm
- java-1.8.0-openjdk-src-debug-1.8.0.171-7.b10.el7.ppc64.rpm
- java-1.8.0-openjdk-devel-1.8.0.171-7.b10.el7.s390x.rpm
- java-1.8.0-openjdk-debug-1.8.0.171-7.b10.el7.aarch64.rpm
- java-1.8.0-openjdk-1.8.0.171-7.b10.el7.ppc64le.rpm
- java-1.8.0-openjdk-demo-debug-1.8.0.171-7.b10.el7.i686.rpm
- java-1.8.0-openjdk-devel-debug-1.8.0.171-7.b10.el7.i686.rpm
- java-1.8.0-openjdk-demo-debug-1.8.0.171-7.b10.el7.ppc64.rpm
- java-1.8.0-openjdk-accessibility-debug-1.8.0.171-7.b10.el7.ppc64.rpm
- java-1.8.0-openjdk-headless-1.8.0.171-7.b10.el7.x86_64.rpm
- java-1.8.0-openjdk-debug-1.8.0.171-7.b10.el7.ppc64.rpm
- java-1.8.0-openjdk-accessibility-1.8.0.171-7.b10.el7.aarch64.rpm
- java-1.8.0-openjdk-demo-debug-1.8.0.171-7.b10.el7.ppc64le.rpm
- java-1.8.0-openjdk-debuginfo-1.8.0.171-7.b10.el7.i686.rpm
- java-1.8.0-openjdk-javadoc-1.8.0.171-7.b10.el7.noarch.rpm
- java-1.8.0-openjdk-devel-1.8.0.171-7.b10.el7.i686.rpm
- java-1.8.0-openjdk-1.8.0.171-7.b10.el7.x86_64.rpm
- java-1.8.0-openjdk-src-debug-1.8.0.171-7.b10.el7.i686.rpm
- java-1.8.0-openjdk-debuginfo-1.8.0.171-7.b10.el7.s390x.rpm
- java-1.8.0-openjdk-src-debug-1.8.0.171-7.b10.el7.aarch64.rpm
- java-1.8.0-openjdk-debug-1.8.0.171-7.b10.el7.x86_64.rpm
- java-1.8.0-openjdk-demo-debug-1.8.0.171-7.b10.el7.aarch64.rpm
- java-1.8.0-openjdk-devel-1.8.0.171-7.b10.el7.x86_64.rpm
- java-1.8.0-openjdk-javadoc-zip-1.8.0.171-7.b10.el7.noarch.rpm
- java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.171-7.b10.el7.noarch.rpm
- java-1.8.0-openjdk-src-debug-1.8.0.171-7.b10.el7.x86_64.rpm
- java-1.8.0-openjdk-devel-1.8.0.171-7.b10.el7.ppc64le.rpm
- java-1.8.0-openjdk-demo-1.8.0.171-7.b10.el7.s390x.rpm
- java-1.8.0-openjdk-headless-1.8.0.171-7.b10.el7.s390x.rpm
- java-1.8.0-openjdk-headless-1.8.0.171-7.b10.el7.ppc64le.rpm
- java-1.8.0-openjdk-debuginfo-1.8.0.171-7.b10.el7.ppc64.rpm
- java-1.8.0-openjdk-1.8.0.171-7.b10.el7.i686.rpm
- java-1.8.0-openjdk-1.8.0.171-7.b10.el7.aarch64.rpm
- java-1.8.0-openjdk-headless-debug-1.8.0.171-7.b10.el7.x86_64.rpm
- java-1.8.0-openjdk-1.8.0.171-7.b10.el7.ppc64.rpm
- java-1.8.0-openjdk-devel-debug-1.8.0.171-7.b10.el7.ppc64le.rpm
- java-1.8.0-openjdk-headless-debug-1.8.0.171-7.b10.el7.aarch64.rpm
- java-1.8.0-openjdk-headless-debug-1.8.0.171-7.b10.el7.ppc64le.rpm
- java-1.8.0-openjdk-src-1.8.0.171-7.b10.el7.s390x.rpm
- java-1.8.0-openjdk-debuginfo-1.8.0.171-7.b10.el7.ppc64le.rpm
- java-1.8.0-openjdk-devel-1.8.0.171-7.b10.el7.ppc64.rpm
- java-1.8.0-openjdk-accessibility-1.8.0.171-7.b10.el7.ppc64le.rpm
- java-1.8.0-openjdk-demo-1.8.0.171-7.b10.el7.x86_64.rpm
- java-1.8.0-openjdk-debuginfo-1.8.0.171-7.b10.el7.x86_64.rpm
- java-1.8.0-openjdk-headless-1.8.0.171-7.b10.el7.aarch64.rpm
- java-1.8.0-openjdk-accessibility-1.8.0.171-7.b10.el7.i686.rpm
- java-1.8.0-openjdk-accessibility-debug-1.8.0.171-7.b10.el7.x86_64.rpm
- java-1.8.0-openjdk-src-1.8.0.171-7.b10.el7.x86_64.rpm
- java-1.8.0-openjdk-headless-debug-1.8.0.171-7.b10.el7.ppc64.rpm
- java-1.8.0-openjdk-demo-1.8.0.171-7.b10.el7.aarch64.rpm
- java-1.8.0-openjdk-debug-1.8.0.171-7.b10.el7.ppc64le.rpm
- java-1.8.0-openjdk-devel-1.8.0.171-7.b10.el7.aarch64.rpm
Fixes
- This content is not included.BZ - 1567121
- This content is not included.BZ - 1567126
- This content is not included.BZ - 1567351
- This content is not included.BZ - 1567537
- This content is not included.BZ - 1567542
- This content is not included.BZ - 1567543
- This content is not included.BZ - 1567545
- This content is not included.BZ - 1567546
- This content is not included.BZ - 1568163
- This content is not included.BZ - 1568515
CVEs
- CVE-2018-2790
- CVE-2018-2794
- CVE-2018-2795
- CVE-2018-2796
- CVE-2018-2797
- CVE-2018-2798
- CVE-2018-2799
- CVE-2018-2800
- CVE-2018-2814
- CVE-2018-2815
References
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.