- Issued:
- 2018-09-17
- Updated:
- 2018-09-17
RHSA-2018:2713 - Security Advisory
Synopsis
Moderate: java-1.8.0-ibm security update
Type/Severity
Security Advisory: Moderate
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An update for java-1.8.0-ibm is now available for Red Hat Satellite 5.8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
IBM Java SE version 8 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit.
This update upgrades IBM Java SE 8 to version 8 SR5-FP20.
Security Fix(es):
- IBM JDK: privilege escalation via insufficiently restricted access to Attach API (CVE-2018-12539)
- openssl: BN_mod_exp may produce incorrect results on x86_64 (CVE-2017-3732)
- openssl: bn_sqrx8x_internal carry bug on x86_64 (CVE-2017-3736)
- IBM JDK: DoS in the java.math component (CVE-2018-1517)
- IBM JDK: path traversal flaw in the Diagnostic Tooling Framework (CVE-2018-1656)
- Oracle JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (Libraries) (CVE-2018-2940)
- OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547) (CVE-2018-2952)
- Oracle JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (JSSE) (CVE-2018-2973)
- OpenSSL: Double-free in DSA code (CVE-2016-0705)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Red Hat would like to thank the OpenSSL project for reporting CVE-2016-0705. Upstream acknowledges Adam Langley (Google/BoringSSL) as the original reporter of CVE-2016-0705.
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
For this update to take effect, Red Hat Satellite must be restarted ("/usr/sbin/rhn-satellite restart"). All running instances of IBM Java must be restarted for this update to take effect.
Affected Products
- Red Hat Satellite 5.8 x86_64
- Red Hat Satellite 5.8 s390x
Fixes
- BZ - 1310596 - CVE-2016-0705 OpenSSL: Double-free in DSA code
- BZ - 1416856 - CVE-2017-3732 openssl: BN_mod_exp may produce incorrect results on x86_64
- BZ - 1509169 - CVE-2017-3736 openssl: bn_sqrx8x_internal carry bug on x86_64
- BZ - 1600925 - CVE-2018-2952 OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547)
- BZ - 1602145 - CVE-2018-2973 Oracle JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (JSSE)
- BZ - 1602146 - CVE-2018-2940 Oracle JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (Libraries)
- BZ - 1618767 - CVE-2018-12539 IBM JDK: privilege escalation via insufficiently restricted access to Attach API
- BZ - 1618869 - CVE-2018-1656 IBM JDK: path traversal flaw in the Diagnostic Tooling Framework
- BZ - 1618871 - CVE-2018-1517 IBM JDK: DoS in the java.math component
CVEs
Red Hat Satellite 5.8
SRPM | |
---|---|
x86_64 | |
java-1.8.0-ibm-1.8.0.5.20-1jpp.1.el6_10.x86_64.rpm | SHA-256: cdd5ea809c7008e7fd881789292b4adc6041b1e9d72c21c5814f9667c36e3d5e |
java-1.8.0-ibm-devel-1.8.0.5.20-1jpp.1.el6_10.x86_64.rpm | SHA-256: 841241bf499fd4442da1b4416c2c85ac35a53a39953849b4e6a598afa3121586 |
s390x | |
java-1.8.0-ibm-1.8.0.5.20-1jpp.1.el6_10.s390x.rpm | SHA-256: 0e152a1983d49bd6ef0c51bb3acd5d4616048554e9e3ad76809b86637700bce9 |
java-1.8.0-ibm-devel-1.8.0.5.20-1jpp.1.el6_10.s390x.rpm | SHA-256: 969c5887ee4bbcaea495b0dafe409318a3c283154c048269cc04e6aa27fcac0e |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.