rhsa-2019_2737
Vulnerability from csaf_redhat
Published
2019-09-11 15:15
Modified
2024-11-15 08:26
Summary
Red Hat Security Advisory: java-1.8.0-ibm security update
Notes
Topic
An update for java-1.8.0-ibm is now available for Red Hat Satellite 5.8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
IBM Java SE version 8 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit.
This update upgrades IBM Java SE 8 to version 8 SR5-FP40.
Security Fix(es):
* IBM JDK: Out-of-bounds access in the String.getBytes method (CVE-2019-11772)
* IBM JDK: Failure to privatize a value pulled out of the loop by versioning (CVE-2019-11775)
* OpenJDK: Insufficient checks of suppressed exceptions in deserialization (Utilities, 8212328) (CVE-2019-2762)
* OpenJDK: Unbounded memory allocation during deserialization in Collections (Utilities, 8213432) (CVE-2019-2769)
* OpenJDK: Missing URL format validation (Networking, 8221518) (CVE-2019-2816)
* OpenJDK: Insufficient restriction of privileges in AccessController (Security, 8216381) (CVE-2019-2786)
* libpng: use-after-free in png_image_free in png.c (CVE-2019-7317)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for java-1.8.0-ibm is now available for Red Hat Satellite 5.8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "IBM Java SE version 8 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit.\n\nThis update upgrades IBM Java SE 8 to version 8 SR5-FP40.\n\nSecurity Fix(es):\n\n* IBM JDK: Out-of-bounds access in the String.getBytes method (CVE-2019-11772)\n\n* IBM JDK: Failure to privatize a value pulled out of the loop by versioning (CVE-2019-11775)\n\n* OpenJDK: Insufficient checks of suppressed exceptions in deserialization (Utilities, 8212328) (CVE-2019-2762)\n\n* OpenJDK: Unbounded memory allocation during deserialization in Collections (Utilities, 8213432) (CVE-2019-2769)\n\n* OpenJDK: Missing URL format validation (Networking, 8221518) (CVE-2019-2816)\n\n* OpenJDK: Insufficient restriction of privileges in AccessController (Security, 8216381) (CVE-2019-2786)\n\n* libpng: use-after-free in png_image_free in png.c (CVE-2019-7317)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:2737", "url": "https://access.redhat.com/errata/RHSA-2019:2737" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1672409", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1672409" }, { "category": "external", "summary": "1730056", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730056" }, { "category": "external", "summary": "1730099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730099" }, { "category": "external", "summary": "1730255", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730255" }, { "category": "external", "summary": "1730415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730415" }, { "category": "external", "summary": "1738547", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1738547" }, { "category": "external", "summary": "1738549", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1738549" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2737.json" } ], "title": "Red Hat Security Advisory: java-1.8.0-ibm security update", "tracking": { "current_release_date": "2024-11-15T08:26:28+00:00", "generator": { "date": "2024-11-15T08:26:28+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2019:2737", "initial_release_date": "2019-09-11T15:15:17+00:00", "revision_history": [ { "date": "2019-09-11T15:15:17+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-09-11T15:15:17+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T08:26:28+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Satellite 5.8 (RHEL v.6)", "product": { "name": "Red Hat Satellite 5.8 (RHEL v.6)", "product_id": "6Server-Satellite58", "product_identification_helper": { "cpe": "cpe:/a:redhat:network_satellite:5.8::el6" } } } ], "category": "product_family", "name": "Red Hat Satellite" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-ibm-1:1.8.0.5.40-1jpp.1.el6_10.s390x", "product": { "name": "java-1.8.0-ibm-1:1.8.0.5.40-1jpp.1.el6_10.s390x", "product_id": "java-1.8.0-ibm-1:1.8.0.5.40-1jpp.1.el6_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm@1.8.0.5.40-1jpp.1.el6_10?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-devel-1:1.8.0.5.40-1jpp.1.el6_10.s390x", "product": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.40-1jpp.1.el6_10.s390x", "product_id": "java-1.8.0-ibm-devel-1:1.8.0.5.40-1jpp.1.el6_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-devel@1.8.0.5.40-1jpp.1.el6_10?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-ibm-1:1.8.0.5.40-1jpp.1.el6_10.x86_64", "product": { "name": "java-1.8.0-ibm-1:1.8.0.5.40-1jpp.1.el6_10.x86_64", "product_id": "java-1.8.0-ibm-1:1.8.0.5.40-1jpp.1.el6_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm@1.8.0.5.40-1jpp.1.el6_10?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-devel-1:1.8.0.5.40-1jpp.1.el6_10.x86_64", "product": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.40-1jpp.1.el6_10.x86_64", "product_id": "java-1.8.0-ibm-devel-1:1.8.0.5.40-1jpp.1.el6_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-devel@1.8.0.5.40-1jpp.1.el6_10?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-1:1.8.0.5.40-1jpp.1.el6_10.s390x as a component of Red Hat Satellite 5.8 (RHEL v.6)", "product_id": "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.40-1jpp.1.el6_10.s390x" }, "product_reference": "java-1.8.0-ibm-1:1.8.0.5.40-1jpp.1.el6_10.s390x", "relates_to_product_reference": "6Server-Satellite58" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-1:1.8.0.5.40-1jpp.1.el6_10.x86_64 as a component of Red Hat Satellite 5.8 (RHEL v.6)", "product_id": "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.40-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.8.0-ibm-1:1.8.0.5.40-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6Server-Satellite58" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.40-1jpp.1.el6_10.s390x as a component of Red Hat Satellite 5.8 (RHEL v.6)", "product_id": "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.40-1jpp.1.el6_10.s390x" }, "product_reference": "java-1.8.0-ibm-devel-1:1.8.0.5.40-1jpp.1.el6_10.s390x", "relates_to_product_reference": "6Server-Satellite58" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.40-1jpp.1.el6_10.x86_64 as a component of Red Hat Satellite 5.8 (RHEL v.6)", "product_id": "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.40-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.8.0-ibm-devel-1:1.8.0.5.40-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6Server-Satellite58" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-2762", "discovery_date": "2019-07-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1730415" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Utilities). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Insufficient checks of suppressed exceptions in deserialization (Utilities, 8212328)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.40-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.40-1jpp.1.el6_10.x86_64", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.40-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.40-1jpp.1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-2762" }, { "category": "external", "summary": "RHBZ#1730415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730415" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-2762", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2762" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-2762", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-2762" } ], "release_date": "2019-07-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-11T15:15:17+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.40-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.40-1jpp.1.el6_10.x86_64", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.40-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.40-1jpp.1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2737" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.40-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.40-1jpp.1.el6_10.x86_64", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.40-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.40-1jpp.1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: Insufficient checks of suppressed exceptions in deserialization (Utilities, 8212328)" }, { "cve": "CVE-2019-2769", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2019-07-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1730056" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Utilities). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Unbounded memory allocation during deserialization in Collections (Utilities, 8213432)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.40-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.40-1jpp.1.el6_10.x86_64", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.40-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.40-1jpp.1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-2769" }, { "category": "external", "summary": "RHBZ#1730056", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730056" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-2769", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2769" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-2769", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-2769" } ], "release_date": "2019-07-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-11T15:15:17+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.40-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.40-1jpp.1.el6_10.x86_64", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.40-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.40-1jpp.1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2737" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.40-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.40-1jpp.1.el6_10.x86_64", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.40-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.40-1jpp.1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: Unbounded memory allocation during deserialization in Collections (Utilities, 8213432)" }, { "cve": "CVE-2019-2786", "discovery_date": "2019-07-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1730255" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.4 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Insufficient restriction of privileges in AccessController (Security, 8216381)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.40-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.40-1jpp.1.el6_10.x86_64", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.40-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.40-1jpp.1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-2786" }, { "category": "external", "summary": "RHBZ#1730255", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730255" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-2786", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2786" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-2786", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-2786" } ], "release_date": "2019-07-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-11T15:15:17+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.40-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.40-1jpp.1.el6_10.x86_64", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.40-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.40-1jpp.1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2737" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.40-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.40-1jpp.1.el6_10.x86_64", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.40-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.40-1jpp.1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK: Insufficient restriction of privileges in AccessController (Security, 8216381)" }, { "cve": "CVE-2019-2816", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2019-07-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1730099" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Missing URL format validation (Networking, 8221518)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.40-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.40-1jpp.1.el6_10.x86_64", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.40-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.40-1jpp.1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-2816" }, { "category": "external", "summary": "RHBZ#1730099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730099" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-2816", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2816" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-2816", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-2816" } ], "release_date": "2019-07-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-11T15:15:17+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.40-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.40-1jpp.1.el6_10.x86_64", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.40-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.40-1jpp.1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2737" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.40-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.40-1jpp.1.el6_10.x86_64", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.40-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.40-1jpp.1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: Missing URL format validation (Networking, 8221518)" }, { "cve": "CVE-2019-7317", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1672409" } ], "notes": [ { "category": "description", "text": "png_image_free in png.c in libpng 1.6.x before 1.6.37 has a use-after-free because png_image_free_function is called under png_safe_execute.", "title": "Vulnerability description" }, { "category": "summary", "text": "libpng: use-after-free in png_image_free in png.c", "title": "Vulnerability summary" }, { "category": "other", "text": "In general, this flaw cannot be exploited through email in Thunderbird because scripting is disabled when reading mail, but it is potentially a risk in browser or browser-like contexts.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.40-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.40-1jpp.1.el6_10.x86_64", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.40-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.40-1jpp.1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-7317" }, { "category": "external", "summary": "RHBZ#1672409", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1672409" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-7317", "url": "https://www.cve.org/CVERecord?id=CVE-2019-7317" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-7317", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-7317" } ], "release_date": "2019-01-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-11T15:15:17+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.40-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.40-1jpp.1.el6_10.x86_64", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.40-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.40-1jpp.1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2737" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.40-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.40-1jpp.1.el6_10.x86_64", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.40-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.40-1jpp.1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "libpng: use-after-free in png_image_free in png.c" }, { "cve": "CVE-2019-11772", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1738547" } ], "notes": [ { "category": "description", "text": "In Eclipse OpenJ9 prior to 0.15, the String.getBytes(int, int, byte[], int) method does not verify that the provided byte array is non-null nor that the provided index is in bounds when compiled by the JIT. This allows arbitrary writes to any 32-bit address or beyond the end of a byte array within Java code run under a SecurityManager.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: Out-of-bounds access in the String.getBytes method", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.40-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.40-1jpp.1.el6_10.x86_64", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.40-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.40-1jpp.1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-11772" }, { "category": "external", "summary": "RHBZ#1738547", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1738547" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-11772", "url": "https://www.cve.org/CVERecord?id=CVE-2019-11772" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11772", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11772" } ], "release_date": "2019-08-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-11T15:15:17+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.40-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.40-1jpp.1.el6_10.x86_64", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.40-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.40-1jpp.1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2737" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.40-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.40-1jpp.1.el6_10.x86_64", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.40-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.40-1jpp.1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK: Out-of-bounds access in the String.getBytes method" }, { "cve": "CVE-2019-11775", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1738549" } ], "notes": [ { "category": "description", "text": "All builds of Eclipse OpenJ9 prior to 0.15 contain a bug where the loop versioner may fail to privatize a value that is pulled out of the loop by versioning - for example if there is a condition that is moved out of the loop that reads a field we may not privatize the value of that field in the modified copy of the loop allowing the test to see one value of the field and subsequently the loop to see a modified field value without retesting the condition moved out of the loop. This can lead to a variety of different issues but read out of array bounds is one major consequence of these problems.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: Failure to privatize a value pulled out of the loop by versioning", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.40-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.40-1jpp.1.el6_10.x86_64", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.40-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.40-1jpp.1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-11775" }, { "category": "external", "summary": "RHBZ#1738549", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1738549" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-11775", "url": "https://www.cve.org/CVERecord?id=CVE-2019-11775" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11775", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11775" } ], "release_date": "2019-08-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-11T15:15:17+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.40-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.40-1jpp.1.el6_10.x86_64", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.40-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.40-1jpp.1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2737" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.40-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.40-1jpp.1.el6_10.x86_64", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.40-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.40-1jpp.1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK: Failure to privatize a value pulled out of the loop by versioning" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.