Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2018-2964 (GCVE-0-2018-2964)
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
Oracle Corporation | Java |
Version: Java SE: 8u172 Version: 10.0.1 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T04:36:39.462Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", }, { name: "104780", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/104780", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20180726-0001/", }, { name: "RHSA-2018:2256", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:2256", }, { name: "RHSA-2018:2253", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:2253", }, { name: "1041302", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1041302", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2018-2964", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-10-02T18:16:39.452138Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-02T20:13:21.084Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Java", vendor: "Oracle Corporation", versions: [ { status: "affected", version: "Java SE: 8u172", }, { status: "affected", version: "10.0.1", }, ], }, ], datePublic: "2018-03-27T00:00:00", descriptions: [ { lang: "en", value: "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 8u172 and 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", }, ], problemTypes: [ { descriptions: [ { description: "Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE.", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-07-27T09:57:01", orgId: "43595867-4340-4103-b7a2-9a5208d29a85", shortName: "oracle", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", }, { name: "104780", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/104780", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20180726-0001/", }, { name: "RHSA-2018:2256", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2018:2256", }, { name: "RHSA-2018:2253", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2018:2253", }, { name: "1041302", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1041302", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert_us@oracle.com", ID: "CVE-2018-2964", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Java", version: { version_data: [ { version_affected: "=", version_value: "Java SE: 8u172", }, { version_affected: "=", version_value: "10.0.1", }, ], }, }, ], }, vendor_name: "Oracle Corporation", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 8u172 and 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE.", }, ], }, ], }, references: { reference_data: [ { name: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", }, { name: "104780", refsource: "BID", url: "http://www.securityfocus.com/bid/104780", }, { name: "https://security.netapp.com/advisory/ntap-20180726-0001/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20180726-0001/", }, { name: "RHSA-2018:2256", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:2256", }, { name: "RHSA-2018:2253", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:2253", }, { name: "1041302", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1041302", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "43595867-4340-4103-b7a2-9a5208d29a85", assignerShortName: "oracle", cveId: "CVE-2018-2964", datePublished: "2018-07-18T13:00:00", dateReserved: "2017-12-15T00:00:00", dateUpdated: "2024-10-02T20:13:21.084Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { fkie_nvd: { configurations: "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jdk:1.8.0:update172:*:*:*:*:*:*\", \"matchCriteriaId\": \"C6BB93E3-3983-40FD-A119-11334C707755\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jdk:10.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3C103C17-E4A9-40A2-959B-29547D706DFC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jre:1.8.0:update172:*:*:*:*:*:*\", \"matchCriteriaId\": \"788BDADB-6F4E-4DFD-BE2E-2D9B3AFBA5CA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jre:10.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1EBB11AD-EA72-4C15-945E-D335A1BF0979\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*\", \"matchCriteriaId\": \"3A756737-1CC4-42C2-A4DF-E1C893B4E2D5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*\", \"matchCriteriaId\": \"B55E8D50-99B4-47EC-86F9-699B67D473CE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C2089EE-5D7F-47EC-8EA5-0F69790564C4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11.0\", \"versionEndIncluding\": \"11.70.1\", \"matchCriteriaId\": \"73F81EC3-4AB0-4CD7-B845-267C5974DE98\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0D9CC59D-6182-4B5E-96B5-226FCD343916\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F1BE6C1F-2565-4E97-92AA-16563E5660A5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C18CA4B5-28FD-4199-B1F0-B1E59E920370\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5735E553-9731-4AAC-BCFF-989377F817B3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FFE0A9D2-9A49-4BF6-BC6F-8249162D8334\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*\", \"matchCriteriaId\": \"25BBBC1A-228F-45A6-AE95-DB915EDF84BD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:sap:*:*\", \"matchCriteriaId\": \"C57D2B31-9696-4451-BA04-D093FFCF7E39\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E94F7F59-1785-493F-91A7-5F5EA5E87E4D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*\", \"versionStartIncluding\": \"9.7\", \"matchCriteriaId\": \"9DBEE506-E864-4FC6-B5D3-7E134438592C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"9.7\", \"matchCriteriaId\": \"5E73AC99-34AC-4D4B-A946-34F33AAEC4A1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:9.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FF20DCD2-7BDD-4BD1-8B29-9216E881EA8D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*\", \"versionStartIncluding\": \"9.7\", \"matchCriteriaId\": \"D4BE7695-11DB-4F04-A469-91A29A83B358\"}]}]}]", descriptions: "[{\"lang\": \"en\", \"value\": \"Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 8u172 and 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).\"}, {\"lang\": \"es\", \"value\": \"Vulnerabilidad en el componente Java SE de Oracle Java SE (subcomponente: Deployment). Las versiones compatibles que se han visto afectadas son JavaSE: 8u172 y 10.0.1. Una vulnerabilidad dif\\u00edcilmente explotable permite que un atacante sin autenticar que tenga acceso a red por m\\u00faltiples protocolos comprometa la seguridad de Java SE. Para que los ataques tengan \\u00e9xito, se necesita la participaci\\u00f3n de otra persona diferente del atacante y, aunque la vulnerabilidad est\\u00e1 presente en Java SE, los ataques podr\\u00edan afectar seriamente a productos adicionales. Los ataques exitosos a esta vulnerabilidad pueden resultar en la toma de control de Java SE. Nota: esta vulnerabilidad se aplica a implementaciones Java, normalmente en clientes que ejecutan aplicaciones Java Web Start en sandbox o applets Java en sandbox que cargan y ejecutan c\\u00f3digo que no es de confianza (por ejemplo, c\\u00f3digo proveniente de internet) y que conf\\u00edan en la sandbox de aislado Java para protegerse. Esta vulnerabilidad no se aplica a implementaciones Java, normalmente en servidores, que solo cargan y ejecutan c\\u00f3digo de confianza (por ejemplo, c\\u00f3digo instalado por un administrador). CVSS 3.0 Base Score 8.3 (impactos en la confidencialidad, integridad y disponibilidad). Vector CVSS: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).\"}]", id: "CVE-2018-2964", lastModified: "2024-11-21T04:04:51.237", metrics: "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H\", \"baseScore\": 8.3, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.6, \"impactScore\": 6.0}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:H/Au:N/C:P/I:P/A:P\", \"baseScore\": 5.1, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"HIGH\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 4.9, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}", published: "2018-07-18T13:29:03.507", references: "[{\"url\": \"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html\", \"source\": \"secalert_us@oracle.com\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/104780\", \"source\": \"secalert_us@oracle.com\", \"tags\": [\"Broken Link\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id/1041302\", \"source\": \"secalert_us@oracle.com\", \"tags\": [\"Broken Link\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2018:2253\", \"source\": \"secalert_us@oracle.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2018:2256\", \"source\": \"secalert_us@oracle.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20180726-0001/\", \"source\": \"secalert_us@oracle.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/104780\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id/1041302\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2018:2253\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2018:2256\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20180726-0001/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]", sourceIdentifier: "secalert_us@oracle.com", vulnStatus: "Modified", weaknesses: "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]", }, nvd: "{\"cve\":{\"id\":\"CVE-2018-2964\",\"sourceIdentifier\":\"secalert_us@oracle.com\",\"published\":\"2018-07-18T13:29:03.507\",\"lastModified\":\"2024-11-21T04:04:51.237\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 8u172 and 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad en el componente Java SE de Oracle Java SE (subcomponente: Deployment). Las versiones compatibles que se han visto afectadas son JavaSE: 8u172 y 10.0.1. Una vulnerabilidad difícilmente explotable permite que un atacante sin autenticar que tenga acceso a red por múltiples protocolos comprometa la seguridad de Java SE. Para que los ataques tengan éxito, se necesita la participación de otra persona diferente del atacante y, aunque la vulnerabilidad está presente en Java SE, los ataques podrían afectar seriamente a productos adicionales. Los ataques exitosos a esta vulnerabilidad pueden resultar en la toma de control de Java SE. Nota: esta vulnerabilidad se aplica a implementaciones Java, normalmente en clientes que ejecutan aplicaciones Java Web Start en sandbox o applets Java en sandbox que cargan y ejecutan código que no es de confianza (por ejemplo, código proveniente de internet) y que confían en la sandbox de aislado Java para protegerse. Esta vulnerabilidad no se aplica a implementaciones Java, normalmente en servidores, que solo cargan y ejecutan código de confianza (por ejemplo, código instalado por un administrador). CVSS 3.0 Base Score 8.3 (impactos en la confidencialidad, integridad y disponibilidad). Vector CVSS: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H\",\"baseScore\":8.3,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.6,\"impactScore\":6.0}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:H/Au:N/C:P/I:P/A:P\",\"baseScore\":5.1,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"HIGH\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":4.9,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.8.0:update172:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6BB93E3-3983-40FD-A119-11334C707755\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:10.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C103C17-E4A9-40A2-959B-29547D706DFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.8.0:update172:*:*:*:*:*:*\",\"matchCriteriaId\":\"788BDADB-6F4E-4DFD-BE2E-2D9B3AFBA5CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:10.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EBB11AD-EA72-4C15-945E-D335A1BF0979\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*\",\"matchCriteriaId\":\"3A756737-1CC4-42C2-A4DF-E1C893B4E2D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*\",\"matchCriteriaId\":\"B55E8D50-99B4-47EC-86F9-699B67D473CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C2089EE-5D7F-47EC-8EA5-0F69790564C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.0\",\"versionEndIncluding\":\"11.70.1\",\"matchCriteriaId\":\"73F81EC3-4AB0-4CD7-B845-267C5974DE98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D9CC59D-6182-4B5E-96B5-226FCD343916\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1BE6C1F-2565-4E97-92AA-16563E5660A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C18CA4B5-28FD-4199-B1F0-B1E59E920370\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5735E553-9731-4AAC-BCFF-989377F817B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FFE0A9D2-9A49-4BF6-BC6F-8249162D8334\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*\",\"matchCriteriaId\":\"25BBBC1A-228F-45A6-AE95-DB915EDF84BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:sap:*:*\",\"matchCriteriaId\":\"C57D2B31-9696-4451-BA04-D093FFCF7E39\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E94F7F59-1785-493F-91A7-5F5EA5E87E4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*\",\"versionStartIncluding\":\"9.7\",\"matchCriteriaId\":\"9DBEE506-E864-4FC6-B5D3-7E134438592C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"9.7\",\"matchCriteriaId\":\"5E73AC99-34AC-4D4B-A946-34F33AAEC4A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:9.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF20DCD2-7BDD-4BD1-8B29-9216E881EA8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*\",\"versionStartIncluding\":\"9.7\",\"matchCriteriaId\":\"D4BE7695-11DB-4F04-A469-91A29A83B358\"}]}]}],\"references\":[{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/104780\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1041302\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2253\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2256\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20180726-0001/\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/104780\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1041302\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2253\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2256\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20180726-0001/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}", vulnrichment: { containers: "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://www.securityfocus.com/bid/104780\", \"name\": \"104780\", \"tags\": [\"vdb-entry\", \"x_refsource_BID\", \"x_transferred\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20180726-0001/\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2018:2256\", \"name\": \"RHSA-2018:2256\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2018:2253\", \"name\": \"RHSA-2018:2253\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"http://www.securitytracker.com/id/1041302\", \"name\": \"1041302\", \"tags\": [\"vdb-entry\", \"x_refsource_SECTRACK\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-05T04:36:39.462Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2018-2964\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-10-02T18:16:39.452138Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-10-02T18:17:20.984Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"Oracle Corporation\", \"product\": \"Java\", \"versions\": [{\"status\": \"affected\", \"version\": \"Java SE: 8u172\"}, {\"status\": \"affected\", \"version\": \"10.0.1\"}]}], \"datePublic\": \"2018-03-27T00:00:00\", \"references\": [{\"url\": \"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://www.securityfocus.com/bid/104780\", \"name\": \"104780\", \"tags\": [\"vdb-entry\", \"x_refsource_BID\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20180726-0001/\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2018:2256\", \"name\": \"RHSA-2018:2256\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2018:2253\", \"name\": \"RHSA-2018:2253\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"http://www.securitytracker.com/id/1041302\", \"name\": \"1041302\", \"tags\": [\"vdb-entry\", \"x_refsource_SECTRACK\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 8u172 and 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE.\"}]}], \"providerMetadata\": {\"orgId\": \"43595867-4340-4103-b7a2-9a5208d29a85\", \"shortName\": \"oracle\", \"dateUpdated\": \"2018-07-27T09:57:01\"}, \"x_legacyV4Record\": {\"affects\": {\"vendor\": {\"vendor_data\": [{\"product\": {\"product_data\": [{\"version\": {\"version_data\": [{\"version_value\": \"Java SE: 8u172\", \"version_affected\": \"=\"}, {\"version_value\": \"10.0.1\", \"version_affected\": \"=\"}]}, \"product_name\": \"Java\"}]}, \"vendor_name\": \"Oracle Corporation\"}]}}, \"data_type\": \"CVE\", \"references\": {\"reference_data\": [{\"url\": \"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html\", \"name\": \"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://www.securityfocus.com/bid/104780\", \"name\": \"104780\", \"refsource\": \"BID\"}, {\"url\": \"https://security.netapp.com/advisory/ntap-20180726-0001/\", \"name\": \"https://security.netapp.com/advisory/ntap-20180726-0001/\", \"refsource\": \"CONFIRM\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2018:2256\", \"name\": \"RHSA-2018:2256\", \"refsource\": \"REDHAT\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2018:2253\", \"name\": \"RHSA-2018:2253\", \"refsource\": \"REDHAT\"}, {\"url\": \"http://www.securitytracker.com/id/1041302\", \"name\": \"1041302\", \"refsource\": \"SECTRACK\"}]}, \"data_format\": \"MITRE\", \"description\": {\"description_data\": [{\"lang\": \"eng\", \"value\": \"Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 8u172 and 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).\"}]}, \"problemtype\": {\"problemtype_data\": [{\"description\": [{\"lang\": \"eng\", \"value\": \"Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE.\"}]}]}, \"data_version\": \"4.0\", \"CVE_data_meta\": {\"ID\": \"CVE-2018-2964\", \"STATE\": \"PUBLIC\", \"ASSIGNER\": \"secalert_us@oracle.com\"}}}}", cveMetadata: "{\"cveId\": \"CVE-2018-2964\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-10-02T20:13:21.084Z\", \"dateReserved\": \"2017-12-15T00:00:00\", \"assignerOrgId\": \"43595867-4340-4103-b7a2-9a5208d29a85\", \"datePublished\": \"2018-07-18T13:00:00\", \"assignerShortName\": \"oracle\"}", dataType: "CVE_RECORD", dataVersion: "5.1", }, }, }
suse-su-2018:2839-2
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for java-1_8_0-ibm", title: "Title of the patch", }, { category: "description", text: "This update for java-1_8_0-ibm to 8.0.5.20 fixes the following security issues:\n\n- CVE-2018-2952: Vulnerability in subcomponent: Concurrency. Difficult to\n exploit vulnerability allowed unauthenticated attacker with network access via\n multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful\n attacks of this vulnerability can result in unauthorized ability to cause a\n partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit\n (bsc#1104668)\n- CVE-2018-2940: Vulnerability in subcomponent: Libraries. Easily exploitable\n vulnerability allowed unauthenticated attacker with network access via multiple\n protocols to compromise Java SE, Java SE Embedded. Successful attacks require\n human interaction from a person other than the attacker. Successful attacks of\n this vulnerability can result in unauthorized read access to a subset of Java\n SE, Java SE Embedded accessible data (bsc#1104668)\n- CVE-2018-2973: Vulnerability in subcomponent: JSSE. Difficult to exploit\n vulnerability allowed unauthenticated attacker with network access via SSL/TLS\n to compromise Java SE, Java SE Embedded. Successful attacks of this\n vulnerability can result in unauthorized creation, deletion or modification\n access to critical data or all Java SE, Java SE Embedded accessible data\n (bsc#1104668)\n- CVE-2018-2964: Vulnerability in subcomponent: Deployment. Difficult to\n exploit vulnerability allowed unauthenticated attacker with network access via\n multiple protocols to compromise Java SE. Successful attacks require human\n interaction from a person other than the attacker. Successful attacks of this\n vulnerability can result in takeover of Java SE. (bsc#1104668)\n- CVE-2016-0705: Prevent double free in the dsa_priv_decode function that\n allowed remote attackers to cause a denial of service (memory corruption) or\n possibly have unspecified other impact via a malformed DSA private key\n (bsc#1104668)\n- CVE-2017-3732: Prevent carry propagating bug in the x86_64 Montgomery\n squaring procedure (bsc#1104668)\n- CVE-2017-3736: Prevent carry propagating bug in the x86_64 Montgomery\n squaring procedure (bsc#1104668)\n- CVE-2018-1517: Unspecified vulnerability (bsc#1104668)\n- CVE-2018-1656: Unspecified vulnerability (bsc#1104668)\n- CVE-2018-12539: Users other than the process owner might have been able to\n use Java Attach API to connect to an IBM JVM on the same machine and use Attach\n API operations, which includes the ability to execute untrusted native code\n (bsc#1104668)\n\n", title: "Description of the patch", }, { category: "details", text: "SUSE-SLE-SERVER-12-SP2-BCL-2018-1987", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2839-2.json", }, { category: "self", summary: "URL for SUSE-SU-2018:2839-2", url: "https://www.suse.com/support/update/announcement/2018/suse-su-20182839-2/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2018:2839-2", url: "https://lists.suse.com/pipermail/sle-security-updates/2018-October/004738.html", }, { category: "self", summary: "SUSE Bug 1104668", url: "https://bugzilla.suse.com/1104668", }, { category: "self", summary: "SUSE CVE CVE-2016-0705 page", url: "https://www.suse.com/security/cve/CVE-2016-0705/", }, { category: "self", summary: "SUSE CVE CVE-2017-3732 page", url: "https://www.suse.com/security/cve/CVE-2017-3732/", }, { category: "self", summary: "SUSE CVE CVE-2017-3736 page", url: "https://www.suse.com/security/cve/CVE-2017-3736/", }, { category: "self", summary: "SUSE CVE CVE-2018-12539 page", url: "https://www.suse.com/security/cve/CVE-2018-12539/", }, { category: "self", summary: "SUSE CVE CVE-2018-1517 page", url: "https://www.suse.com/security/cve/CVE-2018-1517/", }, { category: "self", summary: "SUSE CVE CVE-2018-1656 page", url: "https://www.suse.com/security/cve/CVE-2018-1656/", }, { category: "self", summary: "SUSE CVE CVE-2018-2940 page", url: "https://www.suse.com/security/cve/CVE-2018-2940/", }, { category: "self", summary: "SUSE CVE CVE-2018-2952 page", url: "https://www.suse.com/security/cve/CVE-2018-2952/", }, { category: "self", summary: "SUSE CVE CVE-2018-2964 page", url: "https://www.suse.com/security/cve/CVE-2018-2964/", }, { category: "self", summary: "SUSE CVE CVE-2018-2973 page", url: "https://www.suse.com/security/cve/CVE-2018-2973/", }, ], title: "Security update for java-1_8_0-ibm", tracking: { current_release_date: "2018-10-18T12:49:55Z", generator: { date: "2018-10-18T12:49:55Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2018:2839-2", initial_release_date: "2018-10-18T12:49:55Z", revision_history: [ { date: "2018-10-18T12:49:55Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", product: { name: "java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", product_id: "java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", }, }, { category: "product_version", name: "java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", product: { name: "java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", product_id: "java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", }, }, { category: "product_version", name: "java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", product: { name: "java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", product_id: "java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", }, }, { category: "product_version", name: "java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", product: { name: "java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", product_id: "java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP2-BCL", product: { name: "SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL", product_identification_helper: { cpe: "cpe:/o:suse:sles-bcl:12:sp2", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", }, product_reference: "java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", }, product_reference: "java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", }, product_reference: "java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", }, product_reference: "java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, ], }, vulnerabilities: [ { cve: "CVE-2016-0705", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-0705", }, ], notes: [ { category: "general", text: "Double free vulnerability in the dsa_priv_decode function in crypto/dsa/dsa_ameth.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a malformed DSA private key.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-0705", url: "https://www.suse.com/security/cve/CVE-2016-0705", }, { category: "external", summary: "SUSE Bug 968044 for CVE-2016-0705", url: "https://bugzilla.suse.com/968044", }, { category: "external", summary: "SUSE Bug 968047 for CVE-2016-0705", url: "https://bugzilla.suse.com/968047", }, { category: "external", summary: "SUSE Bug 971238 for CVE-2016-0705", url: "https://bugzilla.suse.com/971238", }, { category: "external", summary: "SUSE Bug 976341 for CVE-2016-0705", url: "https://bugzilla.suse.com/976341", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-18T12:49:55Z", details: "critical", }, ], title: "CVE-2016-0705", }, { cve: "CVE-2017-3732", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-3732", }, ], notes: [ { category: "general", text: "There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL 1.0.2 before 1.0.2k and 1.1.0 before 1.1.0d. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. For example this can occur by default in OpenSSL DHE based SSL/TLS ciphersuites. Note: This issue is very similar to CVE-2015-3193 but must be treated as a separate problem.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-3732", url: "https://www.suse.com/security/cve/CVE-2017-3732", }, { category: "external", summary: "SUSE Bug 1021641 for CVE-2017-3732", url: "https://bugzilla.suse.com/1021641", }, { category: "external", summary: "SUSE Bug 1022086 for CVE-2017-3732", url: "https://bugzilla.suse.com/1022086", }, { category: "external", summary: "SUSE Bug 1049418 for CVE-2017-3732", url: "https://bugzilla.suse.com/1049418", }, { category: "external", summary: "SUSE Bug 1049421 for CVE-2017-3732", url: "https://bugzilla.suse.com/1049421", }, { category: "external", summary: "SUSE Bug 1049422 for CVE-2017-3732", url: "https://bugzilla.suse.com/1049422", }, { category: "external", summary: "SUSE Bug 1066242 for CVE-2017-3732", url: "https://bugzilla.suse.com/1066242", }, { category: "external", summary: "SUSE Bug 1071906 for CVE-2017-3732", url: "https://bugzilla.suse.com/1071906", }, { category: "external", summary: "SUSE Bug 957814 for CVE-2017-3732", url: "https://bugzilla.suse.com/957814", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-18T12:49:55Z", details: "low", }, ], title: "CVE-2017-3732", }, { cve: "CVE-2017-3736", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-3736", }, ], notes: [ { category: "general", text: "There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL before 1.0.2m and 1.1.0 before 1.1.0g. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. This only affects processors that support the BMI1, BMI2 and ADX extensions like Intel Broadwell (5th generation) and later or AMD Ryzen.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-3736", url: "https://www.suse.com/security/cve/CVE-2017-3736", }, { category: "external", summary: "SUSE Bug 1066242 for CVE-2017-3736", url: "https://bugzilla.suse.com/1066242", }, { category: "external", summary: "SUSE Bug 1071906 for CVE-2017-3736", url: "https://bugzilla.suse.com/1071906", }, { category: "external", summary: "SUSE Bug 1076369 for CVE-2017-3736", url: "https://bugzilla.suse.com/1076369", }, { category: "external", summary: "SUSE Bug 957814 for CVE-2017-3736", url: "https://bugzilla.suse.com/957814", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-18T12:49:55Z", details: "moderate", }, ], title: "CVE-2017-3736", }, { cve: "CVE-2018-12539", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-12539", }, ], notes: [ { category: "general", text: "In Eclipse OpenJ9 version 0.8, users other than the process owner may be able to use Java Attach API to connect to an Eclipse OpenJ9 or IBM JVM on the same machine and use Attach API operations, which includes the ability to execute untrusted native code. Attach API is enabled by default on Windows, Linux and AIX JVMs and can be disabled using the command line option -Dcom.ibm.tools.attach.enable=no.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-12539", url: "https://www.suse.com/security/cve/CVE-2018-12539", }, { category: "external", summary: "SUSE Bug 1101645 for CVE-2018-12539", url: "https://bugzilla.suse.com/1101645", }, { category: "external", summary: "SUSE Bug 1101656 for CVE-2018-12539", url: "https://bugzilla.suse.com/1101656", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-18T12:49:55Z", details: "important", }, ], title: "CVE-2018-12539", }, { cve: "CVE-2018-1517", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1517", }, ], notes: [ { category: "general", text: "A flaw in the java.math component in IBM SDK, Java Technology Edition 6.0, 7.0, and 8.0 may allow an attacker to inflict a denial-of-service attack with specially crafted String data. IBM X-Force ID: 141681.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1517", url: "https://www.suse.com/security/cve/CVE-2018-1517", }, { category: "external", summary: "SUSE Bug 1101645 for CVE-2018-1517", url: "https://bugzilla.suse.com/1101645", }, { category: "external", summary: "SUSE Bug 1101656 for CVE-2018-1517", url: "https://bugzilla.suse.com/1101656", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-18T12:49:55Z", details: "critical", }, ], title: "CVE-2018-1517", }, { cve: "CVE-2018-1656", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1656", }, ], notes: [ { category: "general", text: "The IBM Java Runtime Environment's Diagnostic Tooling Framework for Java (DTFJ) (IBM SDK, Java Technology Edition 6.0 , 7.0, and 8.0) does not protect against path traversal attacks when extracting compressed dump files. IBM X-Force ID: 144882.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1656", url: "https://www.suse.com/security/cve/CVE-2018-1656", }, { category: "external", summary: "SUSE Bug 1101645 for CVE-2018-1656", url: "https://bugzilla.suse.com/1101645", }, { category: "external", summary: "SUSE Bug 1101656 for CVE-2018-1656", url: "https://bugzilla.suse.com/1101656", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-18T12:49:55Z", details: "critical", }, ], title: "CVE-2018-1656", }, { cve: "CVE-2018-2940", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2940", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2940", url: "https://www.suse.com/security/cve/CVE-2018-2940", }, { category: "external", summary: "SUSE Bug 1101645 for CVE-2018-2940", url: "https://bugzilla.suse.com/1101645", }, { category: "external", summary: "SUSE Bug 1101656 for CVE-2018-2940", url: "https://bugzilla.suse.com/1101656", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-18T12:49:55Z", details: "important", }, ], title: "CVE-2018-2940", }, { cve: "CVE-2018-2952", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2952", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171; JRockit: R28.3.18. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2952", url: "https://www.suse.com/security/cve/CVE-2018-2952", }, { category: "external", summary: "SUSE Bug 1101645 for CVE-2018-2952", url: "https://bugzilla.suse.com/1101645", }, { category: "external", summary: "SUSE Bug 1101651 for CVE-2018-2952", url: "https://bugzilla.suse.com/1101651", }, { category: "external", summary: "SUSE Bug 1101656 for CVE-2018-2952", url: "https://bugzilla.suse.com/1101656", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-18T12:49:55Z", details: "important", }, ], title: "CVE-2018-2952", }, { cve: "CVE-2018-2964", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2964", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 8u172 and 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2964", url: "https://www.suse.com/security/cve/CVE-2018-2964", }, { category: "external", summary: "SUSE Bug 1101645 for CVE-2018-2964", url: "https://bugzilla.suse.com/1101645", }, { category: "external", summary: "SUSE Bug 1101653 for CVE-2018-2964", url: "https://bugzilla.suse.com/1101653", }, { category: "external", summary: "SUSE Bug 1101656 for CVE-2018-2964", url: "https://bugzilla.suse.com/1101656", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.3, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-18T12:49:55Z", details: "important", }, ], title: "CVE-2018-2964", }, { cve: "CVE-2018-2973", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2973", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SSL/TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2973", url: "https://www.suse.com/security/cve/CVE-2018-2973", }, { category: "external", summary: "SUSE Bug 1101645 for CVE-2018-2973", url: "https://bugzilla.suse.com/1101645", }, { category: "external", summary: "SUSE Bug 1101656 for CVE-2018-2973", url: "https://bugzilla.suse.com/1101656", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-18T12:49:55Z", details: "important", }, ], title: "CVE-2018-2973", }, ], }
suse-su-2018:3082-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for java-1_8_0-ibm", title: "Title of the patch", }, { category: "description", text: "This update for java-1_8_0-ibm to 8.0.5.20 fixes the following issues:\n\n- CVE-2018-2952: Vulnerability in subcomponent: Concurrency. Difficult to\n exploit vulnerability allowed unauthenticated attacker with network access via\n multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful\n attacks of this vulnerability can result in unauthorized ability to cause a\n partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit\n (bsc#1104668).\n- CVE-2018-2940: Vulnerability in subcomponent: Libraries. Easily exploitable\n vulnerability allowed unauthenticated attacker with network access via multiple\n protocols to compromise Java SE, Java SE Embedded. Successful attacks require\n human interaction from a person other than the attacker. Successful attacks of\n this vulnerability can result in unauthorized read access to a subset of Java\n SE, Java SE Embedded accessible data (bsc#1104668).\n- CVE-2018-2973: Vulnerability in subcomponent: JSSE. Difficult to exploit\n vulnerability allowed unauthenticated attacker with network access via SSL/TLS\n to compromise Java SE, Java SE Embedded. Successful attacks of this\n vulnerability can result in unauthorized creation, deletion or modification\n access to critical data or all Java SE, Java SE Embedded accessible data\n (bsc#1104668).\n- CVE-2018-2964: Vulnerability in subcomponent: Deployment. Difficult to\n exploit vulnerability allowed unauthenticated attacker with network access via\n multiple protocols to compromise Java SE. Successful attacks require human\n interaction from a person other than the attacker. Successful attacks of this\n vulnerability can result in takeover of Java SE. (bsc#1104668).\n- CVE-2016-0705: Prevent double free in the dsa_priv_decode function that\n allowed remote attackers to cause a denial of service (memory corruption) or\n possibly have unspecified other impact via a malformed DSA private key\n (bsc#1104668).\n- CVE-2017-3732: Prevent carry propagating bug in the x86_64 Montgomery\n squaring procedure (bsc#1104668).\n- CVE-2017-3736: Prevent carry propagating bug in the x86_64 Montgomery\n squaring procedure (bsc#1104668).\n- CVE-2018-12539: Users other than the process owner might have been able to\n use Java Attach API to connect to an IBM JVM on the same machine and use Attach\n API operations, which includes the ability to execute untrusted native code\n (bsc#1104668) \n- CVE-2018-1517: Unspecified vulnerability (bsc#1104668).\n- CVE-2018-1656: Unspecified vulnerability (bsc#1104668) \n", title: "Description of the patch", }, { category: "details", text: "SUSE-SLE-Module-Legacy-15-2018-2183", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_3082-1.json", }, { category: "self", summary: "URL for SUSE-SU-2018:3082-1", url: "https://www.suse.com/support/update/announcement/2018/suse-su-20183082-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2018:3082-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2018-October/004658.html", }, { category: "self", summary: "SUSE Bug 1104668", url: "https://bugzilla.suse.com/1104668", }, { category: "self", summary: "SUSE CVE CVE-2016-0705 page", url: "https://www.suse.com/security/cve/CVE-2016-0705/", }, { category: "self", summary: "SUSE CVE CVE-2017-3732 page", url: "https://www.suse.com/security/cve/CVE-2017-3732/", }, { category: "self", summary: "SUSE CVE CVE-2017-3736 page", url: "https://www.suse.com/security/cve/CVE-2017-3736/", }, { category: "self", summary: "SUSE CVE CVE-2018-12539 page", url: "https://www.suse.com/security/cve/CVE-2018-12539/", }, { category: "self", summary: "SUSE CVE CVE-2018-1517 page", url: "https://www.suse.com/security/cve/CVE-2018-1517/", }, { category: "self", summary: "SUSE CVE CVE-2018-1656 page", url: "https://www.suse.com/security/cve/CVE-2018-1656/", }, { category: "self", summary: "SUSE CVE CVE-2018-2940 page", url: "https://www.suse.com/security/cve/CVE-2018-2940/", }, { category: "self", summary: "SUSE CVE CVE-2018-2952 page", url: "https://www.suse.com/security/cve/CVE-2018-2952/", }, { category: "self", summary: "SUSE CVE CVE-2018-2964 page", url: "https://www.suse.com/security/cve/CVE-2018-2964/", }, { category: "self", summary: "SUSE CVE CVE-2018-2973 page", url: "https://www.suse.com/security/cve/CVE-2018-2973/", }, ], title: "Security update for java-1_8_0-ibm", tracking: { current_release_date: "2018-10-09T09:30:37Z", generator: { date: "2018-10-09T09:30:37Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2018:3082-1", initial_release_date: "2018-10-09T09:30:37Z", revision_history: [ { date: "2018-10-09T09:30:37Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.ppc64le", product: { name: "java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.ppc64le", product_id: "java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.ppc64le", }, }, { category: "product_version", name: "java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.ppc64le", product: { name: "java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.ppc64le", product_id: "java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.s390x", product: { name: "java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.s390x", product_id: "java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.s390x", }, }, { category: "product_version", name: "java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.s390x", product: { name: "java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.s390x", product_id: "java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.x86_64", product: { name: "java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.x86_64", product_id: "java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.x86_64", }, }, { category: "product_version", name: "java-1_8_0-ibm-alsa-1.8.0_sr5.20-3.6.2.x86_64", product: { name: "java-1_8_0-ibm-alsa-1.8.0_sr5.20-3.6.2.x86_64", product_id: "java-1_8_0-ibm-alsa-1.8.0_sr5.20-3.6.2.x86_64", }, }, { category: "product_version", name: "java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.x86_64", product: { name: "java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.x86_64", product_id: "java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.x86_64", }, }, { category: "product_version", name: "java-1_8_0-ibm-plugin-1.8.0_sr5.20-3.6.2.x86_64", product: { name: "java-1_8_0-ibm-plugin-1.8.0_sr5.20-3.6.2.x86_64", product_id: "java-1_8_0-ibm-plugin-1.8.0_sr5.20-3.6.2.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Legacy 15", product: { name: "SUSE Linux Enterprise Module for Legacy 15", product_id: "SUSE Linux Enterprise Module for Legacy 15", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-legacy:15", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15", product_id: "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.ppc64le", }, product_reference: "java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.s390x as component of SUSE Linux Enterprise Module for Legacy 15", product_id: "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.s390x", }, product_reference: "java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15", product_id: "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.x86_64", }, product_reference: "java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-ibm-alsa-1.8.0_sr5.20-3.6.2.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15", product_id: "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.20-3.6.2.x86_64", }, product_reference: "java-1_8_0-ibm-alsa-1.8.0_sr5.20-3.6.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15", product_id: "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.ppc64le", }, product_reference: "java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.s390x as component of SUSE Linux Enterprise Module for Legacy 15", product_id: "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.s390x", }, product_reference: "java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15", product_id: "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.x86_64", }, product_reference: "java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-ibm-plugin-1.8.0_sr5.20-3.6.2.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15", product_id: "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.20-3.6.2.x86_64", }, product_reference: "java-1_8_0-ibm-plugin-1.8.0_sr5.20-3.6.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15", }, ], }, vulnerabilities: [ { cve: "CVE-2016-0705", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-0705", }, ], notes: [ { category: "general", text: "Double free vulnerability in the dsa_priv_decode function in crypto/dsa/dsa_ameth.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a malformed DSA private key.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.20-3.6.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-0705", url: "https://www.suse.com/security/cve/CVE-2016-0705", }, { category: "external", summary: "SUSE Bug 968044 for CVE-2016-0705", url: "https://bugzilla.suse.com/968044", }, { category: "external", summary: "SUSE Bug 968047 for CVE-2016-0705", url: "https://bugzilla.suse.com/968047", }, { category: "external", summary: "SUSE Bug 971238 for CVE-2016-0705", url: "https://bugzilla.suse.com/971238", }, { category: "external", summary: "SUSE Bug 976341 for CVE-2016-0705", url: "https://bugzilla.suse.com/976341", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.20-3.6.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.20-3.6.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-09T09:30:37Z", details: "critical", }, ], title: "CVE-2016-0705", }, { cve: "CVE-2017-3732", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-3732", }, ], notes: [ { category: "general", text: "There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL 1.0.2 before 1.0.2k and 1.1.0 before 1.1.0d. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. For example this can occur by default in OpenSSL DHE based SSL/TLS ciphersuites. Note: This issue is very similar to CVE-2015-3193 but must be treated as a separate problem.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.20-3.6.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-3732", url: "https://www.suse.com/security/cve/CVE-2017-3732", }, { category: "external", summary: "SUSE Bug 1021641 for CVE-2017-3732", url: "https://bugzilla.suse.com/1021641", }, { category: "external", summary: "SUSE Bug 1022086 for CVE-2017-3732", url: "https://bugzilla.suse.com/1022086", }, { category: "external", summary: "SUSE Bug 1049418 for CVE-2017-3732", url: "https://bugzilla.suse.com/1049418", }, { category: "external", summary: "SUSE Bug 1049421 for CVE-2017-3732", url: "https://bugzilla.suse.com/1049421", }, { category: "external", summary: "SUSE Bug 1049422 for CVE-2017-3732", url: "https://bugzilla.suse.com/1049422", }, { category: "external", summary: "SUSE Bug 1066242 for CVE-2017-3732", url: "https://bugzilla.suse.com/1066242", }, { category: "external", summary: "SUSE Bug 1071906 for CVE-2017-3732", url: "https://bugzilla.suse.com/1071906", }, { category: "external", summary: "SUSE Bug 957814 for CVE-2017-3732", url: "https://bugzilla.suse.com/957814", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.20-3.6.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.20-3.6.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-09T09:30:37Z", details: "low", }, ], title: "CVE-2017-3732", }, { cve: "CVE-2017-3736", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-3736", }, ], notes: [ { category: "general", text: "There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL before 1.0.2m and 1.1.0 before 1.1.0g. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. This only affects processors that support the BMI1, BMI2 and ADX extensions like Intel Broadwell (5th generation) and later or AMD Ryzen.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.20-3.6.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-3736", url: "https://www.suse.com/security/cve/CVE-2017-3736", }, { category: "external", summary: "SUSE Bug 1066242 for CVE-2017-3736", url: "https://bugzilla.suse.com/1066242", }, { category: "external", summary: "SUSE Bug 1071906 for CVE-2017-3736", url: "https://bugzilla.suse.com/1071906", }, { category: "external", summary: "SUSE Bug 1076369 for CVE-2017-3736", url: "https://bugzilla.suse.com/1076369", }, { category: "external", summary: "SUSE Bug 957814 for CVE-2017-3736", url: "https://bugzilla.suse.com/957814", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.20-3.6.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.20-3.6.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-09T09:30:37Z", details: "moderate", }, ], title: "CVE-2017-3736", }, { cve: "CVE-2018-12539", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-12539", }, ], notes: [ { category: "general", text: "In Eclipse OpenJ9 version 0.8, users other than the process owner may be able to use Java Attach API to connect to an Eclipse OpenJ9 or IBM JVM on the same machine and use Attach API operations, which includes the ability to execute untrusted native code. Attach API is enabled by default on Windows, Linux and AIX JVMs and can be disabled using the command line option -Dcom.ibm.tools.attach.enable=no.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.20-3.6.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-12539", url: "https://www.suse.com/security/cve/CVE-2018-12539", }, { category: "external", summary: "SUSE Bug 1101645 for CVE-2018-12539", url: "https://bugzilla.suse.com/1101645", }, { category: "external", summary: "SUSE Bug 1101656 for CVE-2018-12539", url: "https://bugzilla.suse.com/1101656", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.20-3.6.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.20-3.6.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-09T09:30:37Z", details: "important", }, ], title: "CVE-2018-12539", }, { cve: "CVE-2018-1517", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1517", }, ], notes: [ { category: "general", text: "A flaw in the java.math component in IBM SDK, Java Technology Edition 6.0, 7.0, and 8.0 may allow an attacker to inflict a denial-of-service attack with specially crafted String data. IBM X-Force ID: 141681.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.20-3.6.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1517", url: "https://www.suse.com/security/cve/CVE-2018-1517", }, { category: "external", summary: "SUSE Bug 1101645 for CVE-2018-1517", url: "https://bugzilla.suse.com/1101645", }, { category: "external", summary: "SUSE Bug 1101656 for CVE-2018-1517", url: "https://bugzilla.suse.com/1101656", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.20-3.6.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.20-3.6.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-09T09:30:37Z", details: "critical", }, ], title: "CVE-2018-1517", }, { cve: "CVE-2018-1656", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1656", }, ], notes: [ { category: "general", text: "The IBM Java Runtime Environment's Diagnostic Tooling Framework for Java (DTFJ) (IBM SDK, Java Technology Edition 6.0 , 7.0, and 8.0) does not protect against path traversal attacks when extracting compressed dump files. IBM X-Force ID: 144882.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.20-3.6.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1656", url: "https://www.suse.com/security/cve/CVE-2018-1656", }, { category: "external", summary: "SUSE Bug 1101645 for CVE-2018-1656", url: "https://bugzilla.suse.com/1101645", }, { category: "external", summary: "SUSE Bug 1101656 for CVE-2018-1656", url: "https://bugzilla.suse.com/1101656", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.20-3.6.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.20-3.6.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-09T09:30:37Z", details: "critical", }, ], title: "CVE-2018-1656", }, { cve: "CVE-2018-2940", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2940", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.20-3.6.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2940", url: "https://www.suse.com/security/cve/CVE-2018-2940", }, { category: "external", summary: "SUSE Bug 1101645 for CVE-2018-2940", url: "https://bugzilla.suse.com/1101645", }, { category: "external", summary: "SUSE Bug 1101656 for CVE-2018-2940", url: "https://bugzilla.suse.com/1101656", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.20-3.6.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.20-3.6.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-09T09:30:37Z", details: "important", }, ], title: "CVE-2018-2940", }, { cve: "CVE-2018-2952", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2952", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171; JRockit: R28.3.18. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.20-3.6.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2952", url: "https://www.suse.com/security/cve/CVE-2018-2952", }, { category: "external", summary: "SUSE Bug 1101645 for CVE-2018-2952", url: "https://bugzilla.suse.com/1101645", }, { category: "external", summary: "SUSE Bug 1101651 for CVE-2018-2952", url: "https://bugzilla.suse.com/1101651", }, { category: "external", summary: "SUSE Bug 1101656 for CVE-2018-2952", url: "https://bugzilla.suse.com/1101656", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.20-3.6.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.20-3.6.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-09T09:30:37Z", details: "important", }, ], title: "CVE-2018-2952", }, { cve: "CVE-2018-2964", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2964", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 8u172 and 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.20-3.6.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2964", url: "https://www.suse.com/security/cve/CVE-2018-2964", }, { category: "external", summary: "SUSE Bug 1101645 for CVE-2018-2964", url: "https://bugzilla.suse.com/1101645", }, { category: "external", summary: "SUSE Bug 1101653 for CVE-2018-2964", url: "https://bugzilla.suse.com/1101653", }, { category: "external", summary: "SUSE Bug 1101656 for CVE-2018-2964", url: "https://bugzilla.suse.com/1101656", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.20-3.6.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.3, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.20-3.6.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-09T09:30:37Z", details: "important", }, ], title: "CVE-2018-2964", }, { cve: "CVE-2018-2973", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2973", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SSL/TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.20-3.6.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2973", url: "https://www.suse.com/security/cve/CVE-2018-2973", }, { category: "external", summary: "SUSE Bug 1101645 for CVE-2018-2973", url: "https://bugzilla.suse.com/1101645", }, { category: "external", summary: "SUSE Bug 1101656 for CVE-2018-2973", url: "https://bugzilla.suse.com/1101656", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.20-3.6.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.20-3.6.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.20-3.6.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-09T09:30:37Z", details: "important", }, ], title: "CVE-2018-2973", }, ], }
suse-su-2018:2839-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for java-1_8_0-ibm", title: "Title of the patch", }, { category: "description", text: "This update for java-1_8_0-ibm to 8.0.5.20 fixes the following security issues:\n\n- CVE-2018-2952: Vulnerability in subcomponent: Concurrency. Difficult to\n exploit vulnerability allowed unauthenticated attacker with network access via\n multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful\n attacks of this vulnerability can result in unauthorized ability to cause a\n partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit\n (bsc#1104668)\n- CVE-2018-2940: Vulnerability in subcomponent: Libraries. Easily exploitable\n vulnerability allowed unauthenticated attacker with network access via multiple\n protocols to compromise Java SE, Java SE Embedded. Successful attacks require\n human interaction from a person other than the attacker. Successful attacks of\n this vulnerability can result in unauthorized read access to a subset of Java\n SE, Java SE Embedded accessible data (bsc#1104668)\n- CVE-2018-2973: Vulnerability in subcomponent: JSSE. Difficult to exploit\n vulnerability allowed unauthenticated attacker with network access via SSL/TLS\n to compromise Java SE, Java SE Embedded. Successful attacks of this\n vulnerability can result in unauthorized creation, deletion or modification\n access to critical data or all Java SE, Java SE Embedded accessible data\n (bsc#1104668)\n- CVE-2018-2964: Vulnerability in subcomponent: Deployment. Difficult to\n exploit vulnerability allowed unauthenticated attacker with network access via\n multiple protocols to compromise Java SE. Successful attacks require human\n interaction from a person other than the attacker. Successful attacks of this\n vulnerability can result in takeover of Java SE. (bsc#1104668)\n- CVE-2016-0705: Prevent double free in the dsa_priv_decode function that\n allowed remote attackers to cause a denial of service (memory corruption) or\n possibly have unspecified other impact via a malformed DSA private key\n (bsc#1104668)\n- CVE-2017-3732: Prevent carry propagating bug in the x86_64 Montgomery\n squaring procedure (bsc#1104668)\n- CVE-2017-3736: Prevent carry propagating bug in the x86_64 Montgomery\n squaring procedure (bsc#1104668)\n- CVE-2018-1517: Unspecified vulnerability (bsc#1104668)\n- CVE-2018-1656: Unspecified vulnerability (bsc#1104668)\n- CVE-2018-12539: Users other than the process owner might have been able to\n use Java Attach API to connect to an IBM JVM on the same machine and use Attach\n API operations, which includes the ability to execute untrusted native code\n (bsc#1104668)\n\n", title: "Description of the patch", }, { category: "details", text: "SUSE-OpenStack-Cloud-7-2018-1987,SUSE-SLE-SAP-12-SP1-2018-1987,SUSE-SLE-SAP-12-SP2-2018-1987,SUSE-SLE-SDK-12-SP3-2018-1987,SUSE-SLE-SERVER-12-SP1-2018-1987,SUSE-SLE-SERVER-12-SP2-2018-1987,SUSE-SLE-SERVER-12-SP3-2018-1987,SUSE-Storage-4-2018-1987", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2839-1.json", }, { category: "self", summary: "URL for SUSE-SU-2018:2839-1", url: "https://www.suse.com/support/update/announcement/2018/suse-su-20182839-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2018:2839-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2018-September/004590.html", }, { category: "self", summary: "SUSE Bug 1104668", url: "https://bugzilla.suse.com/1104668", }, { category: "self", summary: "SUSE CVE CVE-2016-0705 page", url: "https://www.suse.com/security/cve/CVE-2016-0705/", }, { category: "self", summary: "SUSE CVE CVE-2017-3732 page", url: "https://www.suse.com/security/cve/CVE-2017-3732/", }, { category: "self", summary: "SUSE CVE CVE-2017-3736 page", url: "https://www.suse.com/security/cve/CVE-2017-3736/", }, { category: "self", summary: "SUSE CVE CVE-2018-12539 page", url: "https://www.suse.com/security/cve/CVE-2018-12539/", }, { category: "self", summary: "SUSE CVE CVE-2018-1517 page", url: "https://www.suse.com/security/cve/CVE-2018-1517/", }, { category: "self", summary: "SUSE CVE CVE-2018-1656 page", url: "https://www.suse.com/security/cve/CVE-2018-1656/", }, { category: "self", summary: "SUSE CVE CVE-2018-2940 page", url: "https://www.suse.com/security/cve/CVE-2018-2940/", }, { category: "self", summary: "SUSE CVE CVE-2018-2952 page", url: "https://www.suse.com/security/cve/CVE-2018-2952/", }, { category: "self", summary: "SUSE CVE CVE-2018-2964 page", url: "https://www.suse.com/security/cve/CVE-2018-2964/", }, { category: "self", summary: "SUSE CVE CVE-2018-2973 page", url: "https://www.suse.com/security/cve/CVE-2018-2973/", }, ], title: "Security update for java-1_8_0-ibm", tracking: { current_release_date: "2018-09-24T10:54:00Z", generator: { date: "2018-09-24T10:54:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2018:2839-1", initial_release_date: "2018-09-24T10:54:00Z", revision_history: [ { date: "2018-09-24T10:54:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", product: { name: "java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", product_id: "java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", }, }, { category: "product_version", name: "java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", product: { name: "java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", product_id: "java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", product: { name: "java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", product_id: "java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", }, }, { category: "product_version", name: "java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", product: { name: "java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", product_id: "java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", product: { name: "java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", product_id: "java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", }, }, { category: "product_version", name: "java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", product: { name: "java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", product_id: "java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", }, }, { category: "product_version", name: "java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", product: { name: "java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", product_id: "java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", }, }, { category: "product_version", name: "java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", product: { name: "java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", product_id: "java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE OpenStack Cloud 7", product: { name: "SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7", product_identification_helper: { cpe: "cpe:/o:suse:suse-openstack-cloud:7", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Software Development Kit 12 SP3", product: { name: "SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-sdk:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP1-LTSS", product: { name: "SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:12:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP2-LTSS", product: { name: "SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:12:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP3", product: { name: "SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sles:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp3", }, }, }, { category: "product_name", name: "SUSE Enterprise Storage 4", product: { name: "SUSE Enterprise Storage 4", product_id: "SUSE Enterprise Storage 4", product_identification_helper: { cpe: "cpe:/o:suse:ses:4", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", }, product_reference: "java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64 as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", }, product_reference: "java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64 as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", }, product_reference: "java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", }, product_reference: "java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64 as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", }, product_reference: "java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64 as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", }, product_reference: "java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", }, product_reference: "java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", }, product_reference: "java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", }, product_reference: "java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", }, product_reference: "java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", }, product_reference: "java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", }, product_reference: "java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", }, product_reference: "java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", }, product_reference: "java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", }, product_reference: "java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", }, product_reference: "java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", }, product_reference: "java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", }, product_reference: "java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", }, product_reference: "java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", }, product_reference: "java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", }, product_reference: "java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", }, product_reference: "java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", }, product_reference: "java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", }, product_reference: "java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", }, product_reference: "java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", }, product_reference: "java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", }, product_reference: "java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", }, product_reference: "java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", }, product_reference: "java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", }, product_reference: "java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", }, product_reference: "java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", }, product_reference: "java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", }, product_reference: "java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", }, product_reference: "java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", }, product_reference: "java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", }, product_reference: "java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", }, product_reference: "java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", }, product_reference: "java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", }, product_reference: "java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", }, product_reference: "java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", }, product_reference: "java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", }, product_reference: "java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", }, product_reference: "java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", }, product_reference: "java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", }, product_reference: "java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", }, product_reference: "java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", }, product_reference: "java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64 as component of SUSE Enterprise Storage 4", product_id: "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", }, product_reference: "java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 4", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64 as component of SUSE Enterprise Storage 4", product_id: "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", }, product_reference: "java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 4", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64 as component of SUSE Enterprise Storage 4", product_id: "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", }, product_reference: "java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 4", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64 as component of SUSE Enterprise Storage 4", product_id: "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", }, product_reference: "java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 4", }, ], }, vulnerabilities: [ { cve: "CVE-2016-0705", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-0705", }, ], notes: [ { category: "general", text: "Double free vulnerability in the dsa_priv_decode function in crypto/dsa/dsa_ameth.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a malformed DSA private key.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-0705", url: "https://www.suse.com/security/cve/CVE-2016-0705", }, { category: "external", summary: "SUSE Bug 968044 for CVE-2016-0705", url: "https://bugzilla.suse.com/968044", }, { category: "external", summary: "SUSE Bug 968047 for CVE-2016-0705", url: "https://bugzilla.suse.com/968047", }, { category: "external", summary: "SUSE Bug 971238 for CVE-2016-0705", url: "https://bugzilla.suse.com/971238", }, { category: "external", summary: "SUSE Bug 976341 for CVE-2016-0705", url: "https://bugzilla.suse.com/976341", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-24T10:54:00Z", details: "critical", }, ], title: "CVE-2016-0705", }, { cve: "CVE-2017-3732", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-3732", }, ], notes: [ { category: "general", text: "There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL 1.0.2 before 1.0.2k and 1.1.0 before 1.1.0d. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. For example this can occur by default in OpenSSL DHE based SSL/TLS ciphersuites. Note: This issue is very similar to CVE-2015-3193 but must be treated as a separate problem.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-3732", url: "https://www.suse.com/security/cve/CVE-2017-3732", }, { category: "external", summary: "SUSE Bug 1021641 for CVE-2017-3732", url: "https://bugzilla.suse.com/1021641", }, { category: "external", summary: "SUSE Bug 1022086 for CVE-2017-3732", url: "https://bugzilla.suse.com/1022086", }, { category: "external", summary: "SUSE Bug 1049418 for CVE-2017-3732", url: "https://bugzilla.suse.com/1049418", }, { category: "external", summary: "SUSE Bug 1049421 for CVE-2017-3732", url: "https://bugzilla.suse.com/1049421", }, { category: "external", summary: "SUSE Bug 1049422 for CVE-2017-3732", url: "https://bugzilla.suse.com/1049422", }, { category: "external", summary: "SUSE Bug 1066242 for CVE-2017-3732", url: "https://bugzilla.suse.com/1066242", }, { category: "external", summary: "SUSE Bug 1071906 for CVE-2017-3732", url: "https://bugzilla.suse.com/1071906", }, { category: "external", summary: "SUSE Bug 957814 for CVE-2017-3732", url: "https://bugzilla.suse.com/957814", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-24T10:54:00Z", details: "low", }, ], title: "CVE-2017-3732", }, { cve: "CVE-2017-3736", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-3736", }, ], notes: [ { category: "general", text: "There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL before 1.0.2m and 1.1.0 before 1.1.0g. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. This only affects processors that support the BMI1, BMI2 and ADX extensions like Intel Broadwell (5th generation) and later or AMD Ryzen.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-3736", url: "https://www.suse.com/security/cve/CVE-2017-3736", }, { category: "external", summary: "SUSE Bug 1066242 for CVE-2017-3736", url: "https://bugzilla.suse.com/1066242", }, { category: "external", summary: "SUSE Bug 1071906 for CVE-2017-3736", url: "https://bugzilla.suse.com/1071906", }, { category: "external", summary: "SUSE Bug 1076369 for CVE-2017-3736", url: "https://bugzilla.suse.com/1076369", }, { category: "external", summary: "SUSE Bug 957814 for CVE-2017-3736", url: "https://bugzilla.suse.com/957814", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-24T10:54:00Z", details: "moderate", }, ], title: "CVE-2017-3736", }, { cve: "CVE-2018-12539", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-12539", }, ], notes: [ { category: "general", text: "In Eclipse OpenJ9 version 0.8, users other than the process owner may be able to use Java Attach API to connect to an Eclipse OpenJ9 or IBM JVM on the same machine and use Attach API operations, which includes the ability to execute untrusted native code. Attach API is enabled by default on Windows, Linux and AIX JVMs and can be disabled using the command line option -Dcom.ibm.tools.attach.enable=no.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-12539", url: "https://www.suse.com/security/cve/CVE-2018-12539", }, { category: "external", summary: "SUSE Bug 1101645 for CVE-2018-12539", url: "https://bugzilla.suse.com/1101645", }, { category: "external", summary: "SUSE Bug 1101656 for CVE-2018-12539", url: "https://bugzilla.suse.com/1101656", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-24T10:54:00Z", details: "important", }, ], title: "CVE-2018-12539", }, { cve: "CVE-2018-1517", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1517", }, ], notes: [ { category: "general", text: "A flaw in the java.math component in IBM SDK, Java Technology Edition 6.0, 7.0, and 8.0 may allow an attacker to inflict a denial-of-service attack with specially crafted String data. IBM X-Force ID: 141681.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1517", url: "https://www.suse.com/security/cve/CVE-2018-1517", }, { category: "external", summary: "SUSE Bug 1101645 for CVE-2018-1517", url: "https://bugzilla.suse.com/1101645", }, { category: "external", summary: "SUSE Bug 1101656 for CVE-2018-1517", url: "https://bugzilla.suse.com/1101656", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-24T10:54:00Z", details: "critical", }, ], title: "CVE-2018-1517", }, { cve: "CVE-2018-1656", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1656", }, ], notes: [ { category: "general", text: "The IBM Java Runtime Environment's Diagnostic Tooling Framework for Java (DTFJ) (IBM SDK, Java Technology Edition 6.0 , 7.0, and 8.0) does not protect against path traversal attacks when extracting compressed dump files. IBM X-Force ID: 144882.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1656", url: "https://www.suse.com/security/cve/CVE-2018-1656", }, { category: "external", summary: "SUSE Bug 1101645 for CVE-2018-1656", url: "https://bugzilla.suse.com/1101645", }, { category: "external", summary: "SUSE Bug 1101656 for CVE-2018-1656", url: "https://bugzilla.suse.com/1101656", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-24T10:54:00Z", details: "critical", }, ], title: "CVE-2018-1656", }, { cve: "CVE-2018-2940", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2940", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2940", url: "https://www.suse.com/security/cve/CVE-2018-2940", }, { category: "external", summary: "SUSE Bug 1101645 for CVE-2018-2940", url: "https://bugzilla.suse.com/1101645", }, { category: "external", summary: "SUSE Bug 1101656 for CVE-2018-2940", url: "https://bugzilla.suse.com/1101656", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-24T10:54:00Z", details: "important", }, ], title: "CVE-2018-2940", }, { cve: "CVE-2018-2952", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2952", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171; JRockit: R28.3.18. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2952", url: "https://www.suse.com/security/cve/CVE-2018-2952", }, { category: "external", summary: "SUSE Bug 1101645 for CVE-2018-2952", url: "https://bugzilla.suse.com/1101645", }, { category: "external", summary: "SUSE Bug 1101651 for CVE-2018-2952", url: "https://bugzilla.suse.com/1101651", }, { category: "external", summary: "SUSE Bug 1101656 for CVE-2018-2952", url: "https://bugzilla.suse.com/1101656", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-24T10:54:00Z", details: "important", }, ], title: "CVE-2018-2952", }, { cve: "CVE-2018-2964", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2964", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 8u172 and 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2964", url: "https://www.suse.com/security/cve/CVE-2018-2964", }, { category: "external", summary: "SUSE Bug 1101645 for CVE-2018-2964", url: "https://bugzilla.suse.com/1101645", }, { category: "external", summary: "SUSE Bug 1101653 for CVE-2018-2964", url: "https://bugzilla.suse.com/1101653", }, { category: "external", summary: "SUSE Bug 1101656 for CVE-2018-2964", url: "https://bugzilla.suse.com/1101656", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.3, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-24T10:54:00Z", details: "important", }, ], title: "CVE-2018-2964", }, { cve: "CVE-2018-2973", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2973", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SSL/TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2973", url: "https://www.suse.com/security/cve/CVE-2018-2973", }, { category: "external", summary: "SUSE Bug 1101645 for CVE-2018-2973", url: "https://bugzilla.suse.com/1101645", }, { category: "external", summary: "SUSE Bug 1101656 for CVE-2018-2973", url: "https://bugzilla.suse.com/1101656", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-24T10:54:00Z", details: "important", }, ], title: "CVE-2018-2973", }, ], }
WID-SEC-W-2023-1308
Vulnerability from csaf_certbund
Notes
{ document: { aggregate_severity: { text: "mittel", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Die Java Platform, Standard Edition (SE) ist eine Sammlung von Java-APIs (JDK) und der Java Laufzeit Umgebung (JRE).\r\nJava Standard Edition (SE) Embedded ist die Laufzeitumgebung für die Java-Plattform des US-Unternehmens Oracle Corporation für Embedded Systems.\r\nOracle JRockit JVM ist eine leistungsfähige Java Virtual Machine, die in Oracle Fusion Middleware enthalten ist.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Oracle Java SE, Oracle Java SE Embedded und Oracle JRockit ausnutzen, um die Verfügbarkeit, Vertraulichkeit und Integrität zu gefährden.", title: "Angriff", }, { category: "general", text: "- UNIX\n- Linux\n- Windows\n- Appliance", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2023-1308 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2018/wid-sec-w-2023-1308.json", }, { category: "self", summary: "WID-SEC-2023-1308 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1308", }, { category: "external", summary: "F5 Security Advisory K000134793 vom 2023-05-25", url: "https://my.f5.com/manage/s/article/K000134793", }, { category: "external", summary: "Oracle Critical Patch Update Advisory - Juli 2018 -Java SE vom 2018-07-17", url: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2018-2241 vom 2018-07-23", url: "http://linux.oracle.com/errata/ELSA-2018-2241.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2018:2242 vom 2018-07-23", url: "http://rhn.redhat.com/errata/RHSA-2018-2242.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2018:2241 vom 2018-07-23", url: "http://rhn.redhat.com/errata/RHSA-2018-2241.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2018-2242 vom 2018-07-24", url: "http://linux.oracle.com/errata/ELSA-2018-2242.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2018:2256 vom 2018-07-24", url: "https://access.redhat.com/errata/RHSA-2018:2256", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2018:2255 vom 2018-07-24", url: "https://access.redhat.com/errata/RHSA-2018:2255", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2018:2254 vom 2018-07-24", url: "https://access.redhat.com/errata/RHSA-2018:2254", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2018:2253 vom 2018-07-24", url: "https://access.redhat.com/errata/RHSA-2018:2253", }, { category: "external", summary: "NetApp Security Advisory NTAP-20180726-0001 vom 2018-07-27", url: "https://security.netapp.com/advisory/ntap-20180726-0001/", }, { category: "external", summary: "Hitachi Security Information hitachi-sec-2018-122 vom 2018-07.26", url: "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/hitachi-sec-2018-122/index.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2018:2083-1 vom 2018-07-28", url: "https://www.suse.com/support/update/announcement/2018/suse-su-20182083-1.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2018-2286 vom 2018-07-31", url: "http://linux.oracle.com/errata/ELSA-2018-2286.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2018-2283 vom 2018-07-31", url: "http://linux.oracle.com/errata/ELSA-2018-2283.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2018:2286 vom 2018-07-30", url: "http://rhn.redhat.com/errata/RHSA-2018-2286.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2018:2283 vom 2018-07-30", url: "http://rhn.redhat.com/errata/RHSA-2018-2283.html", }, { category: "external", summary: "CentOS-announce CESA-2018:2242 vom 2018-07-25", url: "https://lists.centos.org/pipermail/centos-announce/2018-July/022972.html", }, { category: "external", summary: "CentOS Security Advisory CESA-2018:2283 vom 2018-08-09", url: "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2018-2283-Moderate-CentOS-6-java-1-7-0-openjdk-Security-Update-tp4645217.html", }, { category: "external", summary: "CentOS Security Advisory CESA-2018:2286 vom 2018-08-09", url: "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2018-2286-Moderate-CentOS-7-java-1-7-0-openjdk-Security-Update-tp4645220.html", }, { category: "external", summary: "Debian Security Advisory DSA-4268 vom 2018-08-11", url: "https://www.debian.org/security/2018/dsa-4268", }, { category: "external", summary: "Ubuntu Security Notice USN-3734-1 vom 2018-08-10", url: "http://www.ubuntu.com/usn/usn-3734-1", }, { category: "external", summary: "Ubuntu Security Notice USN-3735-1 vom 2018-08-10", url: "http://www.ubuntu.com/usn/usn-3735-1", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2018:2568 vom 2018-08-27", url: "http://rhn.redhat.com/errata/RHSA-2018-2568.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2018:2569 vom 2018-08-27", url: "http://rhn.redhat.com/errata/RHSA-2018-2569.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2018:2576 vom 2018-08-28", url: "http://rhn.redhat.com/errata/RHSA-2018-2576.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2018:2575 vom 2018-08-28", url: "http://rhn.redhat.com/errata/RHSA-2018-2575.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2018:2839-1 vom 2018-09-24", url: "https://www.suse.com/support/update/announcement/2018/suse-su-20182839-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2018:3045-1 vom 2018-10-06", url: "https://www.suse.com/support/update/announcement/2018/suse-su-20183045-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2018:3064-1 vom 2018-10-08", url: "https://www.suse.com/support/update/announcement/2018/suse-su-20183064-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2018:3082-1 vom 2018-10-09", url: "https://www.suse.com/support/update/announcement/2018/suse-su-20183082-1.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2018:3007 vom 2018-10-25", url: "https://access.redhat.com/errata/RHSA-2018:3007", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2018:3008 vom 2018-10-25", url: "https://access.redhat.com/errata/RHSA-2018:3008", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2019:0049-1 vom 2019-01-10", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20190049-1/", }, { category: "external", summary: "Dell/EMC Knowledge Base Article: 000529947", url: "https://support.emc.com/kb/529947", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2019:0049-2 vom 2019-04-13", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20190049-2.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2018:3064-3 vom 2019-04-28", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20183064-3.html", }, { category: "external", summary: "Avaya Security Advisory ASA-2018-241 vom 2019-12-20", url: "https://downloads.avaya.com/css/P8/documents/101053536", }, ], source_lang: "en-US", title: "Oracle Java SE: Mehrere Schwachstellen", tracking: { current_release_date: "2023-05-25T22:00:00.000+00:00", generator: { date: "2024-08-15T17:51:27.993+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2023-1308", initial_release_date: "2018-07-17T22:00:00.000+00:00", revision_history: [ { date: "2018-07-17T22:00:00.000+00:00", number: "1", summary: "Initial Release", }, { date: "2018-07-17T22:00:00.000+00:00", number: "2", summary: "Version nicht vorhanden", }, { date: "2018-07-17T22:00:00.000+00:00", number: "3", summary: "Version nicht vorhanden", }, { date: "2018-07-23T22:00:00.000+00:00", number: "4", summary: "New remediations available", }, { date: "2018-07-24T22:00:00.000+00:00", number: "5", summary: "New remediations available", }, { date: "2018-07-24T22:00:00.000+00:00", number: "6", summary: "New remediations available", }, { date: "2018-07-24T22:00:00.000+00:00", number: "7", summary: "Version nicht vorhanden", }, { date: "2018-07-25T22:00:00.000+00:00", number: "8", summary: "New remediations available", }, { date: "2018-07-26T22:00:00.000+00:00", number: "9", summary: "New remediations available", }, { date: "2018-07-26T22:00:00.000+00:00", number: "10", summary: "Version nicht vorhanden", }, { date: "2018-07-26T22:00:00.000+00:00", number: "11", summary: "Version nicht vorhanden", }, { date: "2018-07-29T22:00:00.000+00:00", number: "12", summary: "New remediations available", }, { date: "2018-07-30T22:00:00.000+00:00", number: "13", summary: "New remediations available", }, { date: "2018-07-30T22:00:00.000+00:00", number: "14", summary: "New remediations available", }, { date: "2018-08-09T22:00:00.000+00:00", number: "15", summary: "New remediations available", }, { date: "2018-08-12T22:00:00.000+00:00", number: "16", summary: "New remediations available", }, { date: "2018-08-12T22:00:00.000+00:00", number: "17", summary: "New remediations available", }, { date: "2018-08-12T22:00:00.000+00:00", number: "18", summary: "Version nicht vorhanden", }, { date: "2018-08-12T22:00:00.000+00:00", number: "19", summary: "Version nicht vorhanden", }, { date: "2018-08-27T22:00:00.000+00:00", number: "20", summary: "New remediations available", }, { date: "2018-08-28T22:00:00.000+00:00", number: "21", summary: "New remediations available", }, { date: "2018-09-24T22:00:00.000+00:00", number: "22", summary: "New remediations available", }, { date: "2018-10-07T22:00:00.000+00:00", number: "23", summary: "New remediations available", }, { date: "2018-10-08T22:00:00.000+00:00", number: "24", summary: "New remediations available", }, { date: "2018-10-09T22:00:00.000+00:00", number: "25", summary: "New remediations available", }, { date: "2018-10-24T22:00:00.000+00:00", number: "26", summary: "New remediations available", }, { date: "2018-11-22T23:00:00.000+00:00", number: "27", summary: "reference added", }, { date: "2019-01-09T23:00:00.000+00:00", number: "28", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2019-01-30T23:00:00.000+00:00", number: "29", summary: "Neue Updates von EMC aufgenommen", }, { date: "2019-04-14T22:00:00.000+00:00", number: "30", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2019-04-28T22:00:00.000+00:00", number: "31", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2019-12-22T23:00:00.000+00:00", number: "32", summary: "Neue Updates von AVAYA aufgenommen", }, { date: "2023-05-25T22:00:00.000+00:00", number: "33", summary: "Neue Updates von F5 aufgenommen", }, ], status: "final", version: "33", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "Avaya Aura Experience Portal", product: { name: "Avaya Aura Experience Portal", product_id: "T015519", product_identification_helper: { cpe: "cpe:/a:avaya:aura_experience_portal:-", }, }, }, { category: "product_name", name: "Avaya Aura Session Manager", product: { name: "Avaya Aura Session Manager", product_id: "T015127", product_identification_helper: { cpe: "cpe:/a:avaya:session_manager:-", }, }, }, { category: "product_name", name: "Avaya Aura System Manager", product: { name: "Avaya Aura System Manager", product_id: "T015518", product_identification_helper: { cpe: "cpe:/a:avaya:aura_system_manager:-", }, }, }, ], category: "vendor", name: "Avaya", }, { branches: [ { category: "product_name", name: "Debian Linux", product: { name: "Debian Linux", product_id: "2951", product_identification_helper: { cpe: "cpe:/o:debian:debian_linux:-", }, }, }, ], category: "vendor", name: "Debian", }, { branches: [ { category: "product_name", name: "EMC VNX2", product: { name: "EMC VNX2", product_id: "T004667", product_identification_helper: { cpe: "cpe:/h:emc:vnx:-", }, }, }, ], category: "vendor", name: "EMC", }, { branches: [ { category: "product_name", name: "F5 BIG-IP", product: { name: "F5 BIG-IP", product_id: "T001663", product_identification_helper: { cpe: "cpe:/a:f5:big-ip:-", }, }, }, ], category: "vendor", name: "F5", }, { branches: [ { category: "product_name", name: "Hitachi Command Suite", product: { name: "Hitachi Command Suite", product_id: "T010951", product_identification_helper: { cpe: "cpe:/a:hitachi:command_suite:-", }, }, }, ], category: "vendor", name: "Hitachi", }, { branches: [ { category: "product_name", name: "NetApp OnCommand Unified Manager", product: { name: "NetApp OnCommand Unified Manager", product_id: "T009408", product_identification_helper: { cpe: "cpe:/a:netapp:oncommand_unified_manager:-", }, }, }, ], category: "vendor", name: "NetApp", }, { branches: [ { category: "product_name", name: "Open Source CentOS", product: { name: "Open Source CentOS", product_id: "1727", product_identification_helper: { cpe: "cpe:/o:centos:centos:-", }, }, }, ], category: "vendor", name: "Open Source", }, { branches: [ { category: "product_name", name: "Oracle Java SE", product: { name: "Oracle Java SE", product_id: "T009724", product_identification_helper: { cpe: "cpe:/a:oracle:java_se:-", }, }, }, { category: "product_name", name: "Oracle Linux", product: { name: "Oracle Linux", product_id: "T004914", product_identification_helper: { cpe: "cpe:/o:oracle:linux:-", }, }, }, ], category: "vendor", name: "Oracle", }, { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux", product: { name: "Red Hat Enterprise Linux", product_id: "67646", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:-", }, }, }, ], category: "vendor", name: "Red Hat", }, { branches: [ { category: "product_name", name: "SUSE Linux", product: { name: "SUSE Linux", product_id: "T002207", product_identification_helper: { cpe: "cpe:/o:suse:suse_linux:-", }, }, }, ], category: "vendor", name: "SUSE", }, { branches: [ { category: "product_name", name: "Ubuntu Linux", product: { name: "Ubuntu Linux", product_id: "T000126", product_identification_helper: { cpe: "cpe:/o:canonical:ubuntu_linux:-", }, }, }, ], category: "vendor", name: "Ubuntu", }, ], }, vulnerabilities: [ { cve: "CVE-2018-2938", notes: [ { category: "description", text: "In Oracle Java SE, Oracle Java SE Embedded und Oracle JRockit existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verfügbarkeit, Vertraulichkeit und Integrität gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung bzw. keine Benutzerinteraktion notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "T015519", "T015518", "T009408", "67646", "T004667", "T009724", "T010951", "T015127", "T004914", "2951", "T002207", "T000126", "T001663", "1727", ], }, release_date: "2018-07-17T22:00:00.000+00:00", title: "CVE-2018-2938", }, { cve: "CVE-2018-2940", notes: [ { category: "description", text: "In Oracle Java SE, Oracle Java SE Embedded und Oracle JRockit existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verfügbarkeit, Vertraulichkeit und Integrität gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung bzw. keine Benutzerinteraktion notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "T015519", "T015518", "T009408", "67646", "T004667", "T009724", "T010951", "T015127", "T004914", "2951", "T002207", "T000126", "T001663", "1727", ], }, release_date: "2018-07-17T22:00:00.000+00:00", title: "CVE-2018-2940", }, { cve: "CVE-2018-2941", notes: [ { category: "description", text: "In Oracle Java SE, Oracle Java SE Embedded und Oracle JRockit existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verfügbarkeit, Vertraulichkeit und Integrität gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung bzw. keine Benutzerinteraktion notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "T015519", "T015518", "T009408", "67646", "T004667", "T009724", "T010951", "T015127", "T004914", "2951", "T002207", "T000126", "T001663", "1727", ], }, release_date: "2018-07-17T22:00:00.000+00:00", title: "CVE-2018-2941", }, { cve: "CVE-2018-2942", notes: [ { category: "description", text: "In Oracle Java SE, Oracle Java SE Embedded und Oracle JRockit existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verfügbarkeit, Vertraulichkeit und Integrität gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung bzw. keine Benutzerinteraktion notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "T015519", "T015518", "T009408", "67646", "T004667", "T009724", "T010951", "T015127", "T004914", "2951", "T002207", "T000126", "T001663", "1727", ], }, release_date: "2018-07-17T22:00:00.000+00:00", title: "CVE-2018-2942", }, { cve: "CVE-2018-2952", notes: [ { category: "description", text: "In Oracle Java SE, Oracle Java SE Embedded und Oracle JRockit existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verfügbarkeit, Vertraulichkeit und Integrität gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung bzw. keine Benutzerinteraktion notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "T015519", "T015518", "T009408", "67646", "T004667", "T009724", "T010951", "T015127", "T004914", "2951", "T002207", "T000126", "T001663", "1727", ], }, release_date: "2018-07-17T22:00:00.000+00:00", title: "CVE-2018-2952", }, { cve: "CVE-2018-2964", notes: [ { category: "description", text: "In Oracle Java SE, Oracle Java SE Embedded und Oracle JRockit existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verfügbarkeit, Vertraulichkeit und Integrität gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung bzw. keine Benutzerinteraktion notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "T015519", "T015518", "T009408", "67646", "T004667", "T009724", "T010951", "T015127", "T004914", "2951", "T002207", "T000126", "T001663", "1727", ], }, release_date: "2018-07-17T22:00:00.000+00:00", title: "CVE-2018-2964", }, { cve: "CVE-2018-2972", notes: [ { category: "description", text: "In Oracle Java SE, Oracle Java SE Embedded und Oracle JRockit existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verfügbarkeit, Vertraulichkeit und Integrität gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung bzw. keine Benutzerinteraktion notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "T015519", "T015518", "T009408", "67646", "T004667", "T009724", "T010951", "T015127", "T004914", "2951", "T002207", "T000126", "T001663", "1727", ], }, release_date: "2018-07-17T22:00:00.000+00:00", title: "CVE-2018-2972", }, { cve: "CVE-2018-2973", notes: [ { category: "description", text: "In Oracle Java SE, Oracle Java SE Embedded und Oracle JRockit existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verfügbarkeit, Vertraulichkeit und Integrität gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung bzw. keine Benutzerinteraktion notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "T015519", "T015518", "T009408", "67646", "T004667", "T009724", "T010951", "T015127", "T004914", "2951", "T002207", "T000126", "T001663", "1727", ], }, release_date: "2018-07-17T22:00:00.000+00:00", title: "CVE-2018-2973", }, ], }
wid-sec-w-2023-1308
Vulnerability from csaf_certbund
Notes
{ document: { aggregate_severity: { text: "mittel", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Die Java Platform, Standard Edition (SE) ist eine Sammlung von Java-APIs (JDK) und der Java Laufzeit Umgebung (JRE).\r\nJava Standard Edition (SE) Embedded ist die Laufzeitumgebung für die Java-Plattform des US-Unternehmens Oracle Corporation für Embedded Systems.\r\nOracle JRockit JVM ist eine leistungsfähige Java Virtual Machine, die in Oracle Fusion Middleware enthalten ist.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Oracle Java SE, Oracle Java SE Embedded und Oracle JRockit ausnutzen, um die Verfügbarkeit, Vertraulichkeit und Integrität zu gefährden.", title: "Angriff", }, { category: "general", text: "- UNIX\n- Linux\n- Windows\n- Appliance", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2023-1308 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2018/wid-sec-w-2023-1308.json", }, { category: "self", summary: "WID-SEC-2023-1308 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1308", }, { category: "external", summary: "F5 Security Advisory K000134793 vom 2023-05-25", url: "https://my.f5.com/manage/s/article/K000134793", }, { category: "external", summary: "Oracle Critical Patch Update Advisory - Juli 2018 -Java SE vom 2018-07-17", url: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2018-2241 vom 2018-07-23", url: "http://linux.oracle.com/errata/ELSA-2018-2241.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2018:2242 vom 2018-07-23", url: "http://rhn.redhat.com/errata/RHSA-2018-2242.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2018:2241 vom 2018-07-23", url: "http://rhn.redhat.com/errata/RHSA-2018-2241.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2018-2242 vom 2018-07-24", url: "http://linux.oracle.com/errata/ELSA-2018-2242.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2018:2256 vom 2018-07-24", url: "https://access.redhat.com/errata/RHSA-2018:2256", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2018:2255 vom 2018-07-24", url: "https://access.redhat.com/errata/RHSA-2018:2255", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2018:2254 vom 2018-07-24", url: "https://access.redhat.com/errata/RHSA-2018:2254", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2018:2253 vom 2018-07-24", url: "https://access.redhat.com/errata/RHSA-2018:2253", }, { category: "external", summary: "NetApp Security Advisory NTAP-20180726-0001 vom 2018-07-27", url: "https://security.netapp.com/advisory/ntap-20180726-0001/", }, { category: "external", summary: "Hitachi Security Information hitachi-sec-2018-122 vom 2018-07.26", url: "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/hitachi-sec-2018-122/index.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2018:2083-1 vom 2018-07-28", url: "https://www.suse.com/support/update/announcement/2018/suse-su-20182083-1.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2018-2286 vom 2018-07-31", url: "http://linux.oracle.com/errata/ELSA-2018-2286.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2018-2283 vom 2018-07-31", url: "http://linux.oracle.com/errata/ELSA-2018-2283.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2018:2286 vom 2018-07-30", url: "http://rhn.redhat.com/errata/RHSA-2018-2286.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2018:2283 vom 2018-07-30", url: "http://rhn.redhat.com/errata/RHSA-2018-2283.html", }, { category: "external", summary: "CentOS-announce CESA-2018:2242 vom 2018-07-25", url: "https://lists.centos.org/pipermail/centos-announce/2018-July/022972.html", }, { category: "external", summary: "CentOS Security Advisory CESA-2018:2283 vom 2018-08-09", url: "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2018-2283-Moderate-CentOS-6-java-1-7-0-openjdk-Security-Update-tp4645217.html", }, { category: "external", summary: "CentOS Security Advisory CESA-2018:2286 vom 2018-08-09", url: "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2018-2286-Moderate-CentOS-7-java-1-7-0-openjdk-Security-Update-tp4645220.html", }, { category: "external", summary: "Debian Security Advisory DSA-4268 vom 2018-08-11", url: "https://www.debian.org/security/2018/dsa-4268", }, { category: "external", summary: "Ubuntu Security Notice USN-3734-1 vom 2018-08-10", url: "http://www.ubuntu.com/usn/usn-3734-1", }, { category: "external", summary: "Ubuntu Security Notice USN-3735-1 vom 2018-08-10", url: "http://www.ubuntu.com/usn/usn-3735-1", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2018:2568 vom 2018-08-27", url: "http://rhn.redhat.com/errata/RHSA-2018-2568.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2018:2569 vom 2018-08-27", url: "http://rhn.redhat.com/errata/RHSA-2018-2569.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2018:2576 vom 2018-08-28", url: "http://rhn.redhat.com/errata/RHSA-2018-2576.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2018:2575 vom 2018-08-28", url: "http://rhn.redhat.com/errata/RHSA-2018-2575.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2018:2839-1 vom 2018-09-24", url: "https://www.suse.com/support/update/announcement/2018/suse-su-20182839-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2018:3045-1 vom 2018-10-06", url: "https://www.suse.com/support/update/announcement/2018/suse-su-20183045-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2018:3064-1 vom 2018-10-08", url: "https://www.suse.com/support/update/announcement/2018/suse-su-20183064-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2018:3082-1 vom 2018-10-09", url: "https://www.suse.com/support/update/announcement/2018/suse-su-20183082-1.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2018:3007 vom 2018-10-25", url: "https://access.redhat.com/errata/RHSA-2018:3007", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2018:3008 vom 2018-10-25", url: "https://access.redhat.com/errata/RHSA-2018:3008", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2019:0049-1 vom 2019-01-10", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20190049-1/", }, { category: "external", summary: "Dell/EMC Knowledge Base Article: 000529947", url: "https://support.emc.com/kb/529947", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2019:0049-2 vom 2019-04-13", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20190049-2.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2018:3064-3 vom 2019-04-28", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20183064-3.html", }, { category: "external", summary: "Avaya Security Advisory ASA-2018-241 vom 2019-12-20", url: "https://downloads.avaya.com/css/P8/documents/101053536", }, ], source_lang: "en-US", title: "Oracle Java SE: Mehrere Schwachstellen", tracking: { current_release_date: "2023-05-25T22:00:00.000+00:00", generator: { date: "2024-08-15T17:51:27.993+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2023-1308", initial_release_date: "2018-07-17T22:00:00.000+00:00", revision_history: [ { date: "2018-07-17T22:00:00.000+00:00", number: "1", summary: "Initial Release", }, { date: "2018-07-17T22:00:00.000+00:00", number: "2", summary: "Version nicht vorhanden", }, { date: "2018-07-17T22:00:00.000+00:00", number: "3", summary: "Version nicht vorhanden", }, { date: "2018-07-23T22:00:00.000+00:00", number: "4", summary: "New remediations available", }, { date: "2018-07-24T22:00:00.000+00:00", number: "5", summary: "New remediations available", }, { date: "2018-07-24T22:00:00.000+00:00", number: "6", summary: "New remediations available", }, { date: "2018-07-24T22:00:00.000+00:00", number: "7", summary: "Version nicht vorhanden", }, { date: "2018-07-25T22:00:00.000+00:00", number: "8", summary: "New remediations available", }, { date: "2018-07-26T22:00:00.000+00:00", number: "9", summary: "New remediations available", }, { date: "2018-07-26T22:00:00.000+00:00", number: "10", summary: "Version nicht vorhanden", }, { date: "2018-07-26T22:00:00.000+00:00", number: "11", summary: "Version nicht vorhanden", }, { date: "2018-07-29T22:00:00.000+00:00", number: "12", summary: "New remediations available", }, { date: "2018-07-30T22:00:00.000+00:00", number: "13", summary: "New remediations available", }, { date: "2018-07-30T22:00:00.000+00:00", number: "14", summary: "New remediations available", }, { date: "2018-08-09T22:00:00.000+00:00", number: "15", summary: "New remediations available", }, { date: "2018-08-12T22:00:00.000+00:00", number: "16", summary: "New remediations available", }, { date: "2018-08-12T22:00:00.000+00:00", number: "17", summary: "New remediations available", }, { date: "2018-08-12T22:00:00.000+00:00", number: "18", summary: "Version nicht vorhanden", }, { date: "2018-08-12T22:00:00.000+00:00", number: "19", summary: "Version nicht vorhanden", }, { date: "2018-08-27T22:00:00.000+00:00", number: "20", summary: "New remediations available", }, { date: "2018-08-28T22:00:00.000+00:00", number: "21", summary: "New remediations available", }, { date: "2018-09-24T22:00:00.000+00:00", number: "22", summary: "New remediations available", }, { date: "2018-10-07T22:00:00.000+00:00", number: "23", summary: "New remediations available", }, { date: "2018-10-08T22:00:00.000+00:00", number: "24", summary: "New remediations available", }, { date: "2018-10-09T22:00:00.000+00:00", number: "25", summary: "New remediations available", }, { date: "2018-10-24T22:00:00.000+00:00", number: "26", summary: "New remediations available", }, { date: "2018-11-22T23:00:00.000+00:00", number: "27", summary: "reference added", }, { date: "2019-01-09T23:00:00.000+00:00", number: "28", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2019-01-30T23:00:00.000+00:00", number: "29", summary: "Neue Updates von EMC aufgenommen", }, { date: "2019-04-14T22:00:00.000+00:00", number: "30", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2019-04-28T22:00:00.000+00:00", number: "31", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2019-12-22T23:00:00.000+00:00", number: "32", summary: "Neue Updates von AVAYA aufgenommen", }, { date: "2023-05-25T22:00:00.000+00:00", number: "33", summary: "Neue Updates von F5 aufgenommen", }, ], status: "final", version: "33", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "Avaya Aura Experience Portal", product: { name: "Avaya Aura Experience Portal", product_id: "T015519", product_identification_helper: { cpe: "cpe:/a:avaya:aura_experience_portal:-", }, }, }, { category: "product_name", name: "Avaya Aura Session Manager", product: { name: "Avaya Aura Session Manager", product_id: "T015127", product_identification_helper: { cpe: "cpe:/a:avaya:session_manager:-", }, }, }, { category: "product_name", name: "Avaya Aura System Manager", product: { name: "Avaya Aura System Manager", product_id: "T015518", product_identification_helper: { cpe: "cpe:/a:avaya:aura_system_manager:-", }, }, }, ], category: "vendor", name: "Avaya", }, { branches: [ { category: "product_name", name: "Debian Linux", product: { name: "Debian Linux", product_id: "2951", product_identification_helper: { cpe: "cpe:/o:debian:debian_linux:-", }, }, }, ], category: "vendor", name: "Debian", }, { branches: [ { category: "product_name", name: "EMC VNX2", product: { name: "EMC VNX2", product_id: "T004667", product_identification_helper: { cpe: "cpe:/h:emc:vnx:-", }, }, }, ], category: "vendor", name: "EMC", }, { branches: [ { category: "product_name", name: "F5 BIG-IP", product: { name: "F5 BIG-IP", product_id: "T001663", product_identification_helper: { cpe: "cpe:/a:f5:big-ip:-", }, }, }, ], category: "vendor", name: "F5", }, { branches: [ { category: "product_name", name: "Hitachi Command Suite", product: { name: "Hitachi Command Suite", product_id: "T010951", product_identification_helper: { cpe: "cpe:/a:hitachi:command_suite:-", }, }, }, ], category: "vendor", name: "Hitachi", }, { branches: [ { category: "product_name", name: "NetApp OnCommand Unified Manager", product: { name: "NetApp OnCommand Unified Manager", product_id: "T009408", product_identification_helper: { cpe: "cpe:/a:netapp:oncommand_unified_manager:-", }, }, }, ], category: "vendor", name: "NetApp", }, { branches: [ { category: "product_name", name: "Open Source CentOS", product: { name: "Open Source CentOS", product_id: "1727", product_identification_helper: { cpe: "cpe:/o:centos:centos:-", }, }, }, ], category: "vendor", name: "Open Source", }, { branches: [ { category: "product_name", name: "Oracle Java SE", product: { name: "Oracle Java SE", product_id: "T009724", product_identification_helper: { cpe: "cpe:/a:oracle:java_se:-", }, }, }, { category: "product_name", name: "Oracle Linux", product: { name: "Oracle Linux", product_id: "T004914", product_identification_helper: { cpe: "cpe:/o:oracle:linux:-", }, }, }, ], category: "vendor", name: "Oracle", }, { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux", product: { name: "Red Hat Enterprise Linux", product_id: "67646", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:-", }, }, }, ], category: "vendor", name: "Red Hat", }, { branches: [ { category: "product_name", name: "SUSE Linux", product: { name: "SUSE Linux", product_id: "T002207", product_identification_helper: { cpe: "cpe:/o:suse:suse_linux:-", }, }, }, ], category: "vendor", name: "SUSE", }, { branches: [ { category: "product_name", name: "Ubuntu Linux", product: { name: "Ubuntu Linux", product_id: "T000126", product_identification_helper: { cpe: "cpe:/o:canonical:ubuntu_linux:-", }, }, }, ], category: "vendor", name: "Ubuntu", }, ], }, vulnerabilities: [ { cve: "CVE-2018-2938", notes: [ { category: "description", text: "In Oracle Java SE, Oracle Java SE Embedded und Oracle JRockit existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verfügbarkeit, Vertraulichkeit und Integrität gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung bzw. keine Benutzerinteraktion notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "T015519", "T015518", "T009408", "67646", "T004667", "T009724", "T010951", "T015127", "T004914", "2951", "T002207", "T000126", "T001663", "1727", ], }, release_date: "2018-07-17T22:00:00.000+00:00", title: "CVE-2018-2938", }, { cve: "CVE-2018-2940", notes: [ { category: "description", text: "In Oracle Java SE, Oracle Java SE Embedded und Oracle JRockit existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verfügbarkeit, Vertraulichkeit und Integrität gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung bzw. keine Benutzerinteraktion notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "T015519", "T015518", "T009408", "67646", "T004667", "T009724", "T010951", "T015127", "T004914", "2951", "T002207", "T000126", "T001663", "1727", ], }, release_date: "2018-07-17T22:00:00.000+00:00", title: "CVE-2018-2940", }, { cve: "CVE-2018-2941", notes: [ { category: "description", text: "In Oracle Java SE, Oracle Java SE Embedded und Oracle JRockit existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verfügbarkeit, Vertraulichkeit und Integrität gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung bzw. keine Benutzerinteraktion notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "T015519", "T015518", "T009408", "67646", "T004667", "T009724", "T010951", "T015127", "T004914", "2951", "T002207", "T000126", "T001663", "1727", ], }, release_date: "2018-07-17T22:00:00.000+00:00", title: "CVE-2018-2941", }, { cve: "CVE-2018-2942", notes: [ { category: "description", text: "In Oracle Java SE, Oracle Java SE Embedded und Oracle JRockit existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verfügbarkeit, Vertraulichkeit und Integrität gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung bzw. keine Benutzerinteraktion notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "T015519", "T015518", "T009408", "67646", "T004667", "T009724", "T010951", "T015127", "T004914", "2951", "T002207", "T000126", "T001663", "1727", ], }, release_date: "2018-07-17T22:00:00.000+00:00", title: "CVE-2018-2942", }, { cve: "CVE-2018-2952", notes: [ { category: "description", text: "In Oracle Java SE, Oracle Java SE Embedded und Oracle JRockit existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verfügbarkeit, Vertraulichkeit und Integrität gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung bzw. keine Benutzerinteraktion notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "T015519", "T015518", "T009408", "67646", "T004667", "T009724", "T010951", "T015127", "T004914", "2951", "T002207", "T000126", "T001663", "1727", ], }, release_date: "2018-07-17T22:00:00.000+00:00", title: "CVE-2018-2952", }, { cve: "CVE-2018-2964", notes: [ { category: "description", text: "In Oracle Java SE, Oracle Java SE Embedded und Oracle JRockit existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verfügbarkeit, Vertraulichkeit und Integrität gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung bzw. keine Benutzerinteraktion notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "T015519", "T015518", "T009408", "67646", "T004667", "T009724", "T010951", "T015127", "T004914", "2951", "T002207", "T000126", "T001663", "1727", ], }, release_date: "2018-07-17T22:00:00.000+00:00", title: "CVE-2018-2964", }, { cve: "CVE-2018-2972", notes: [ { category: "description", text: "In Oracle Java SE, Oracle Java SE Embedded und Oracle JRockit existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verfügbarkeit, Vertraulichkeit und Integrität gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung bzw. keine Benutzerinteraktion notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "T015519", "T015518", "T009408", "67646", "T004667", "T009724", "T010951", "T015127", "T004914", "2951", "T002207", "T000126", "T001663", "1727", ], }, release_date: "2018-07-17T22:00:00.000+00:00", title: "CVE-2018-2972", }, { cve: "CVE-2018-2973", notes: [ { category: "description", text: "In Oracle Java SE, Oracle Java SE Embedded und Oracle JRockit existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verfügbarkeit, Vertraulichkeit und Integrität gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung bzw. keine Benutzerinteraktion notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "T015519", "T015518", "T009408", "67646", "T004667", "T009724", "T010951", "T015127", "T004914", "2951", "T002207", "T000126", "T001663", "1727", ], }, release_date: "2018-07-17T22:00:00.000+00:00", title: "CVE-2018-2973", }, ], }
rhsa-2018_2256
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Critical", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for java-1.8.0-oracle is now available for Oracle Java for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "Oracle Java SE version 8 includes the Oracle Java Runtime Environment and the Oracle Java Software Development Kit.\n\nThis update upgrades Oracle Java SE 8 to version 8 Update 181.\n\nSecurity Fix(es):\n\n* Oracle JDK: unspecified vulnerability fixed in 7u191, 8u181, and 10.0.2 (JavaFX) (CVE-2018-2941)\n\n* Oracle JDK: unspecified vulnerability fixed in 8u181 and 10.0.2 (Deployment) (CVE-2018-2964)\n\n* Oracle JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (Libraries) (CVE-2018-2940)\n\n* OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547) (CVE-2018-2952)\n\n* Oracle JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (JSSE) (CVE-2018-2973)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2018:2256", url: "https://access.redhat.com/errata/RHSA-2018:2256", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#critical", url: "https://access.redhat.com/security/updates/classification/#critical", }, { category: "external", summary: "1600925", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1600925", }, { category: "external", summary: "1602142", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1602142", }, { category: "external", summary: "1602143", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1602143", }, { category: "external", summary: "1602145", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1602145", }, { category: "external", summary: "1602146", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1602146", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2256.json", }, ], title: "Red Hat Security Advisory: java-1.8.0-oracle security update", tracking: { current_release_date: "2024-11-15T02:11:58+00:00", generator: { date: "2024-11-15T02:11:58+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2018:2256", initial_release_date: "2018-07-24T21:09:42+00:00", revision_history: [ { date: "2018-07-24T21:09:42+00:00", number: "1", summary: "Initial version", }, { date: "2018-07-24T21:09:42+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-15T02:11:58+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Oracle Java for Red Hat Enterprise Linux Desktop 6", product: { name: "Oracle Java for Red Hat Enterprise Linux Desktop 6", product_id: "6Client-OracleJava-6.10.Z", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_extras_oracle_java:6", }, }, }, { category: "product_name", name: "Oracle Java for Red Hat Enterprise Linux HPC Node 6", product: { name: "Oracle Java for Red Hat Enterprise Linux HPC Node 6", product_id: "6ComputeNode-OracleJava-6.10.Z", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_extras_oracle_java:6", }, }, }, { category: "product_name", name: "Oracle Java for Red Hat Enterprise Linux Server 6", product: { name: "Oracle Java for Red Hat Enterprise Linux Server 6", product_id: "6Server-OracleJava-6.10.Z", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_extras_oracle_java:6", }, }, }, { category: "product_name", name: "Oracle Java for Red Hat Enterprise Linux Workstation 6", product: { name: "Oracle Java for Red Hat Enterprise Linux Workstation 6", product_id: "6Workstation-OracleJava-6.10.Z", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_extras_oracle_java:6", }, }, }, ], category: "product_family", name: "Oracle Java for Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", product: { name: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", product_id: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/java-1.8.0-oracle-jdbc@1.8.0.181-1jpp.2.el6?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", product: { name: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", product_id: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/java-1.8.0-oracle-src@1.8.0.181-1jpp.2.el6?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", product: { name: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", product_id: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/java-1.8.0-oracle-javafx@1.8.0.181-1jpp.2.el6?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", product: { name: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", product_id: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/java-1.8.0-oracle-plugin@1.8.0.181-1jpp.2.el6?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", product: { name: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", product_id: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/java-1.8.0-oracle-devel@1.8.0.181-1jpp.2.el6?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", product: { name: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", product_id: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/java-1.8.0-oracle@1.8.0.181-1jpp.2.el6?arch=x86_64&epoch=1", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", product: { name: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", product_id: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", product_identification_helper: { purl: "pkg:rpm/redhat/java-1.8.0-oracle-jdbc@1.8.0.181-1jpp.2.el6?arch=i686&epoch=1", }, }, }, { category: "product_version", name: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", product: { name: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", product_id: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", product_identification_helper: { purl: "pkg:rpm/redhat/java-1.8.0-oracle-src@1.8.0.181-1jpp.2.el6?arch=i686&epoch=1", }, }, }, { category: "product_version", name: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", product: { name: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", product_id: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", product_identification_helper: { purl: "pkg:rpm/redhat/java-1.8.0-oracle-javafx@1.8.0.181-1jpp.2.el6?arch=i686&epoch=1", }, }, }, { category: "product_version", name: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", product: { name: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", product_id: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", product_identification_helper: { purl: "pkg:rpm/redhat/java-1.8.0-oracle-plugin@1.8.0.181-1jpp.2.el6?arch=i686&epoch=1", }, }, }, { category: "product_version", name: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", product: { name: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", product_id: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", product_identification_helper: { purl: "pkg:rpm/redhat/java-1.8.0-oracle-devel@1.8.0.181-1jpp.2.el6?arch=i686&epoch=1", }, }, }, { category: "product_version", name: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", product: { name: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", product_id: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", product_identification_helper: { purl: "pkg:rpm/redhat/java-1.8.0-oracle@1.8.0.181-1jpp.2.el6?arch=i686&epoch=1", }, }, }, ], category: "architecture", name: "i686", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Desktop 6", product_id: "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", }, product_reference: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", relates_to_product_reference: "6Client-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Desktop 6", product_id: "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", }, product_reference: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", relates_to_product_reference: "6Client-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Desktop 6", product_id: "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", }, product_reference: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", relates_to_product_reference: "6Client-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Desktop 6", product_id: "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", }, product_reference: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", relates_to_product_reference: "6Client-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Desktop 6", product_id: "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", }, product_reference: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", relates_to_product_reference: "6Client-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Desktop 6", product_id: "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", }, product_reference: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", relates_to_product_reference: "6Client-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Desktop 6", product_id: "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", }, product_reference: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", relates_to_product_reference: "6Client-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Desktop 6", product_id: "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", }, product_reference: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", relates_to_product_reference: "6Client-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Desktop 6", product_id: "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", }, product_reference: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", relates_to_product_reference: "6Client-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Desktop 6", product_id: "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", }, product_reference: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", relates_to_product_reference: "6Client-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Desktop 6", product_id: "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", }, product_reference: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", relates_to_product_reference: "6Client-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Desktop 6", product_id: "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", }, product_reference: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", relates_to_product_reference: "6Client-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux HPC Node 6", product_id: "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", }, product_reference: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", relates_to_product_reference: "6ComputeNode-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux HPC Node 6", product_id: "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", }, product_reference: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", relates_to_product_reference: "6ComputeNode-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux HPC Node 6", product_id: "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", }, product_reference: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", relates_to_product_reference: "6ComputeNode-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux HPC Node 6", product_id: "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", }, product_reference: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", relates_to_product_reference: "6ComputeNode-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux HPC Node 6", product_id: "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", }, product_reference: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", relates_to_product_reference: "6ComputeNode-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux HPC Node 6", product_id: "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", }, product_reference: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", relates_to_product_reference: "6ComputeNode-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux HPC Node 6", product_id: "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", }, product_reference: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", relates_to_product_reference: "6ComputeNode-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux HPC Node 6", product_id: "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", }, product_reference: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", relates_to_product_reference: "6ComputeNode-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux HPC Node 6", product_id: "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", }, product_reference: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", relates_to_product_reference: "6ComputeNode-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux HPC Node 6", product_id: "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", }, product_reference: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", relates_to_product_reference: "6ComputeNode-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux HPC Node 6", product_id: "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", }, product_reference: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", relates_to_product_reference: "6ComputeNode-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux HPC Node 6", product_id: "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", }, product_reference: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", relates_to_product_reference: "6ComputeNode-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Server 6", product_id: "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", }, product_reference: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", relates_to_product_reference: "6Server-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Server 6", product_id: "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", }, product_reference: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", relates_to_product_reference: "6Server-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Server 6", product_id: "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", }, product_reference: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", relates_to_product_reference: "6Server-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Server 6", product_id: "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", }, product_reference: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", relates_to_product_reference: "6Server-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Server 6", product_id: "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", }, product_reference: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", relates_to_product_reference: "6Server-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Server 6", product_id: "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", }, product_reference: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", relates_to_product_reference: "6Server-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Server 6", product_id: "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", }, product_reference: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", relates_to_product_reference: "6Server-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Server 6", product_id: "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", }, product_reference: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", relates_to_product_reference: "6Server-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Server 6", product_id: "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", }, product_reference: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", relates_to_product_reference: "6Server-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Server 6", product_id: "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", }, product_reference: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", relates_to_product_reference: "6Server-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Server 6", product_id: "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", }, product_reference: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", relates_to_product_reference: "6Server-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Server 6", product_id: "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", }, product_reference: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", relates_to_product_reference: "6Server-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Workstation 6", product_id: "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", }, product_reference: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", relates_to_product_reference: "6Workstation-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Workstation 6", product_id: "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", }, product_reference: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", relates_to_product_reference: "6Workstation-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Workstation 6", product_id: "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", }, product_reference: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", relates_to_product_reference: "6Workstation-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Workstation 6", product_id: "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", }, product_reference: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", relates_to_product_reference: "6Workstation-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Workstation 6", product_id: "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", }, product_reference: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", relates_to_product_reference: "6Workstation-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Workstation 6", product_id: "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", }, product_reference: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", relates_to_product_reference: "6Workstation-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Workstation 6", product_id: "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", }, product_reference: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", relates_to_product_reference: "6Workstation-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Workstation 6", product_id: "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", }, product_reference: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", relates_to_product_reference: "6Workstation-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Workstation 6", product_id: "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", }, product_reference: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", relates_to_product_reference: "6Workstation-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Workstation 6", product_id: "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", }, product_reference: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", relates_to_product_reference: "6Workstation-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Workstation 6", product_id: "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", }, product_reference: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", relates_to_product_reference: "6Workstation-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Workstation 6", product_id: "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", }, product_reference: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", relates_to_product_reference: "6Workstation-OracleJava-6.10.Z", }, ], }, vulnerabilities: [ { cve: "CVE-2018-2940", discovery_date: "2018-07-17T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1602146", }, ], notes: [ { category: "description", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N).", title: "Vulnerability description", }, { category: "summary", text: "JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (Libraries)", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-2940", }, { category: "external", summary: "RHBZ#1602146", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1602146", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-2940", url: "https://www.cve.org/CVERecord?id=CVE-2018-2940", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-2940", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-2940", }, { category: "external", summary: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA", url: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA", }, ], release_date: "2018-07-17T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2018-07-24T21:09:42+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Oracle Java must be restarted for this update to take effect.", product_ids: [ "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2018:2256", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (Libraries)", }, { cve: "CVE-2018-2941", discovery_date: "2018-07-17T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1602143", }, ], notes: [ { category: "description", text: "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: JavaFX). Supported versions that are affected are Java SE: 7u181, 8u172 and 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", title: "Vulnerability description", }, { category: "summary", text: "JDK: unspecified vulnerability fixed in 7u191, 8u181, and 10.0.2 (JavaFX)", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-2941", }, { category: "external", summary: "RHBZ#1602143", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1602143", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-2941", url: "https://www.cve.org/CVERecord?id=CVE-2018-2941", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-2941", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-2941", }, { category: "external", summary: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA", url: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA", }, ], release_date: "2018-07-17T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2018-07-24T21:09:42+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Oracle Java must be restarted for this update to take effect.", product_ids: [ "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2018:2256", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", ], }, ], threats: [ { category: "impact", details: "Critical", }, ], title: "JDK: unspecified vulnerability fixed in 7u191, 8u181, and 10.0.2 (JavaFX)", }, { cve: "CVE-2018-2952", cwe: { id: "CWE-770", name: "Allocation of Resources Without Limits or Throttling", }, discovery_date: "2018-07-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1600925", }, ], notes: [ { category: "description", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171; JRockit: R28.3.18. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "Vulnerability description", }, { category: "summary", text: "OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547)", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-2952", }, { category: "external", summary: "RHBZ#1600925", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1600925", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-2952", url: "https://www.cve.org/CVERecord?id=CVE-2018-2952", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-2952", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-2952", }, ], release_date: "2018-07-17T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2018-07-24T21:09:42+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Oracle Java must be restarted for this update to take effect.", product_ids: [ "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2018:2256", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 3.7, baseSeverity: "LOW", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547)", }, { cve: "CVE-2018-2964", discovery_date: "2018-07-17T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1602142", }, ], notes: [ { category: "description", text: "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 8u172 and 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", title: "Vulnerability description", }, { category: "summary", text: "JDK: unspecified vulnerability fixed in 8u181 and 10.0.2 (Deployment)", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-2964", }, { category: "external", summary: "RHBZ#1602142", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1602142", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-2964", url: "https://www.cve.org/CVERecord?id=CVE-2018-2964", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-2964", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-2964", }, { category: "external", summary: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA", url: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA", }, ], release_date: "2018-07-17T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2018-07-24T21:09:42+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Oracle Java must be restarted for this update to take effect.", product_ids: [ "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2018:2256", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", ], }, ], threats: [ { category: "impact", details: "Critical", }, ], title: "JDK: unspecified vulnerability fixed in 8u181 and 10.0.2 (Deployment)", }, { cve: "CVE-2018-2973", discovery_date: "2018-07-17T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1602145", }, ], notes: [ { category: "description", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SSL/TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", title: "Vulnerability description", }, { category: "summary", text: "JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (JSSE)", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-2973", }, { category: "external", summary: "RHBZ#1602145", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1602145", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-2973", url: "https://www.cve.org/CVERecord?id=CVE-2018-2973", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-2973", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-2973", }, { category: "external", summary: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA", url: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA", }, ], release_date: "2018-07-17T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2018-07-24T21:09:42+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Oracle Java must be restarted for this update to take effect.", product_ids: [ "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2018:2256", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.9, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (JSSE)", }, ], }
RHSA-2018:2256
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Critical", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for java-1.8.0-oracle is now available for Oracle Java for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "Oracle Java SE version 8 includes the Oracle Java Runtime Environment and the Oracle Java Software Development Kit.\n\nThis update upgrades Oracle Java SE 8 to version 8 Update 181.\n\nSecurity Fix(es):\n\n* Oracle JDK: unspecified vulnerability fixed in 7u191, 8u181, and 10.0.2 (JavaFX) (CVE-2018-2941)\n\n* Oracle JDK: unspecified vulnerability fixed in 8u181 and 10.0.2 (Deployment) (CVE-2018-2964)\n\n* Oracle JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (Libraries) (CVE-2018-2940)\n\n* OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547) (CVE-2018-2952)\n\n* Oracle JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (JSSE) (CVE-2018-2973)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2018:2256", url: "https://access.redhat.com/errata/RHSA-2018:2256", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#critical", url: "https://access.redhat.com/security/updates/classification/#critical", }, { category: "external", summary: "1600925", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1600925", }, { category: "external", summary: "1602142", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1602142", }, { category: "external", summary: "1602143", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1602143", }, { category: "external", summary: "1602145", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1602145", }, { category: "external", summary: "1602146", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1602146", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2256.json", }, ], title: "Red Hat Security Advisory: java-1.8.0-oracle security update", tracking: { current_release_date: "2024-11-15T02:11:58+00:00", generator: { date: "2024-11-15T02:11:58+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2018:2256", initial_release_date: "2018-07-24T21:09:42+00:00", revision_history: [ { date: "2018-07-24T21:09:42+00:00", number: "1", summary: "Initial version", }, { date: "2018-07-24T21:09:42+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-15T02:11:58+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Oracle Java for Red Hat Enterprise Linux Desktop 6", product: { name: "Oracle Java for Red Hat Enterprise Linux Desktop 6", product_id: "6Client-OracleJava-6.10.Z", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_extras_oracle_java:6", }, }, }, { category: "product_name", name: "Oracle Java for Red Hat Enterprise Linux HPC Node 6", product: { name: "Oracle Java for Red Hat Enterprise Linux HPC Node 6", product_id: "6ComputeNode-OracleJava-6.10.Z", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_extras_oracle_java:6", }, }, }, { category: "product_name", name: "Oracle Java for Red Hat Enterprise Linux Server 6", product: { name: "Oracle Java for Red Hat Enterprise Linux Server 6", product_id: "6Server-OracleJava-6.10.Z", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_extras_oracle_java:6", }, }, }, { category: "product_name", name: "Oracle Java for Red Hat Enterprise Linux Workstation 6", product: { name: "Oracle Java for Red Hat Enterprise Linux Workstation 6", product_id: "6Workstation-OracleJava-6.10.Z", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_extras_oracle_java:6", }, }, }, ], category: "product_family", name: "Oracle Java for Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", product: { name: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", product_id: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/java-1.8.0-oracle-jdbc@1.8.0.181-1jpp.2.el6?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", product: { name: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", product_id: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/java-1.8.0-oracle-src@1.8.0.181-1jpp.2.el6?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", product: { name: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", product_id: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/java-1.8.0-oracle-javafx@1.8.0.181-1jpp.2.el6?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", product: { name: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", product_id: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/java-1.8.0-oracle-plugin@1.8.0.181-1jpp.2.el6?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", product: { name: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", product_id: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/java-1.8.0-oracle-devel@1.8.0.181-1jpp.2.el6?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", product: { name: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", product_id: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/java-1.8.0-oracle@1.8.0.181-1jpp.2.el6?arch=x86_64&epoch=1", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", product: { name: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", product_id: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", product_identification_helper: { purl: "pkg:rpm/redhat/java-1.8.0-oracle-jdbc@1.8.0.181-1jpp.2.el6?arch=i686&epoch=1", }, }, }, { category: "product_version", name: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", product: { name: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", product_id: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", product_identification_helper: { purl: "pkg:rpm/redhat/java-1.8.0-oracle-src@1.8.0.181-1jpp.2.el6?arch=i686&epoch=1", }, }, }, { category: "product_version", name: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", product: { name: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", product_id: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", product_identification_helper: { purl: "pkg:rpm/redhat/java-1.8.0-oracle-javafx@1.8.0.181-1jpp.2.el6?arch=i686&epoch=1", }, }, }, { category: "product_version", name: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", product: { name: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", product_id: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", product_identification_helper: { purl: "pkg:rpm/redhat/java-1.8.0-oracle-plugin@1.8.0.181-1jpp.2.el6?arch=i686&epoch=1", }, }, }, { category: "product_version", name: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", product: { name: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", product_id: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", product_identification_helper: { purl: "pkg:rpm/redhat/java-1.8.0-oracle-devel@1.8.0.181-1jpp.2.el6?arch=i686&epoch=1", }, }, }, { category: "product_version", name: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", product: { name: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", product_id: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", product_identification_helper: { purl: "pkg:rpm/redhat/java-1.8.0-oracle@1.8.0.181-1jpp.2.el6?arch=i686&epoch=1", }, }, }, ], category: "architecture", name: "i686", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Desktop 6", product_id: "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", }, product_reference: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", relates_to_product_reference: "6Client-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Desktop 6", product_id: "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", }, product_reference: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", relates_to_product_reference: "6Client-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Desktop 6", product_id: "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", }, product_reference: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", relates_to_product_reference: "6Client-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Desktop 6", product_id: "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", }, product_reference: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", relates_to_product_reference: "6Client-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Desktop 6", product_id: "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", }, product_reference: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", relates_to_product_reference: "6Client-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Desktop 6", product_id: "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", }, product_reference: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", relates_to_product_reference: "6Client-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Desktop 6", product_id: "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", }, product_reference: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", relates_to_product_reference: "6Client-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Desktop 6", product_id: "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", }, product_reference: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", relates_to_product_reference: "6Client-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Desktop 6", product_id: "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", }, product_reference: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", relates_to_product_reference: "6Client-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Desktop 6", product_id: "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", }, product_reference: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", relates_to_product_reference: "6Client-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Desktop 6", product_id: "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", }, product_reference: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", relates_to_product_reference: "6Client-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Desktop 6", product_id: "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", }, product_reference: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", relates_to_product_reference: "6Client-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux HPC Node 6", product_id: "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", }, product_reference: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", relates_to_product_reference: "6ComputeNode-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux HPC Node 6", product_id: "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", }, product_reference: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", relates_to_product_reference: "6ComputeNode-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux HPC Node 6", product_id: "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", }, product_reference: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", relates_to_product_reference: "6ComputeNode-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux HPC Node 6", product_id: "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", }, product_reference: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", relates_to_product_reference: "6ComputeNode-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux HPC Node 6", product_id: "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", }, product_reference: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", relates_to_product_reference: "6ComputeNode-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux HPC Node 6", product_id: "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", }, product_reference: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", relates_to_product_reference: "6ComputeNode-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux HPC Node 6", product_id: "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", }, product_reference: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", relates_to_product_reference: "6ComputeNode-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux HPC Node 6", product_id: "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", }, product_reference: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", relates_to_product_reference: "6ComputeNode-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux HPC Node 6", product_id: "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", }, product_reference: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", relates_to_product_reference: "6ComputeNode-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux HPC Node 6", product_id: "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", }, product_reference: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", relates_to_product_reference: "6ComputeNode-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux HPC Node 6", product_id: "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", }, product_reference: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", relates_to_product_reference: "6ComputeNode-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux HPC Node 6", product_id: "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", }, product_reference: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", relates_to_product_reference: "6ComputeNode-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Server 6", product_id: "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", }, product_reference: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", relates_to_product_reference: "6Server-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Server 6", product_id: "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", }, product_reference: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", relates_to_product_reference: "6Server-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Server 6", product_id: "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", }, product_reference: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", relates_to_product_reference: "6Server-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Server 6", product_id: "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", }, product_reference: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", relates_to_product_reference: "6Server-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Server 6", product_id: "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", }, product_reference: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", relates_to_product_reference: "6Server-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Server 6", product_id: "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", }, product_reference: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", relates_to_product_reference: "6Server-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Server 6", product_id: "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", }, product_reference: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", relates_to_product_reference: "6Server-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Server 6", product_id: "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", }, product_reference: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", relates_to_product_reference: "6Server-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Server 6", product_id: "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", }, product_reference: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", relates_to_product_reference: "6Server-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Server 6", product_id: "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", }, product_reference: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", relates_to_product_reference: "6Server-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Server 6", product_id: "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", }, product_reference: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", relates_to_product_reference: "6Server-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Server 6", product_id: "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", }, product_reference: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", relates_to_product_reference: "6Server-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Workstation 6", product_id: "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", }, product_reference: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", relates_to_product_reference: "6Workstation-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Workstation 6", product_id: "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", }, product_reference: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", relates_to_product_reference: "6Workstation-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Workstation 6", product_id: "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", }, product_reference: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", relates_to_product_reference: "6Workstation-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Workstation 6", product_id: "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", }, product_reference: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", relates_to_product_reference: "6Workstation-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Workstation 6", product_id: "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", }, product_reference: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", relates_to_product_reference: "6Workstation-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Workstation 6", product_id: "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", }, product_reference: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", relates_to_product_reference: "6Workstation-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Workstation 6", product_id: "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", }, product_reference: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", relates_to_product_reference: "6Workstation-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Workstation 6", product_id: "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", }, product_reference: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", relates_to_product_reference: "6Workstation-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Workstation 6", product_id: "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", }, product_reference: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", relates_to_product_reference: "6Workstation-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Workstation 6", product_id: "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", }, product_reference: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", relates_to_product_reference: "6Workstation-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Workstation 6", product_id: "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", }, product_reference: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", relates_to_product_reference: "6Workstation-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Workstation 6", product_id: "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", }, product_reference: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", relates_to_product_reference: "6Workstation-OracleJava-6.10.Z", }, ], }, vulnerabilities: [ { cve: "CVE-2018-2940", discovery_date: "2018-07-17T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1602146", }, ], notes: [ { category: "description", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N).", title: "Vulnerability description", }, { category: "summary", text: "JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (Libraries)", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-2940", }, { category: "external", summary: "RHBZ#1602146", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1602146", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-2940", url: "https://www.cve.org/CVERecord?id=CVE-2018-2940", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-2940", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-2940", }, { category: "external", summary: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA", url: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA", }, ], release_date: "2018-07-17T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2018-07-24T21:09:42+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Oracle Java must be restarted for this update to take effect.", product_ids: [ "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2018:2256", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (Libraries)", }, { cve: "CVE-2018-2941", discovery_date: "2018-07-17T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1602143", }, ], notes: [ { category: "description", text: "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: JavaFX). Supported versions that are affected are Java SE: 7u181, 8u172 and 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", title: "Vulnerability description", }, { category: "summary", text: "JDK: unspecified vulnerability fixed in 7u191, 8u181, and 10.0.2 (JavaFX)", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-2941", }, { category: "external", summary: "RHBZ#1602143", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1602143", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-2941", url: "https://www.cve.org/CVERecord?id=CVE-2018-2941", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-2941", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-2941", }, { category: "external", summary: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA", url: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA", }, ], release_date: "2018-07-17T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2018-07-24T21:09:42+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Oracle Java must be restarted for this update to take effect.", product_ids: [ "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2018:2256", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", ], }, ], threats: [ { category: "impact", details: "Critical", }, ], title: "JDK: unspecified vulnerability fixed in 7u191, 8u181, and 10.0.2 (JavaFX)", }, { cve: "CVE-2018-2952", cwe: { id: "CWE-770", name: "Allocation of Resources Without Limits or Throttling", }, discovery_date: "2018-07-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1600925", }, ], notes: [ { category: "description", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171; JRockit: R28.3.18. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "Vulnerability description", }, { category: "summary", text: "OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547)", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-2952", }, { category: "external", summary: "RHBZ#1600925", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1600925", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-2952", url: "https://www.cve.org/CVERecord?id=CVE-2018-2952", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-2952", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-2952", }, ], release_date: "2018-07-17T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2018-07-24T21:09:42+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Oracle Java must be restarted for this update to take effect.", product_ids: [ "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2018:2256", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 3.7, baseSeverity: "LOW", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547)", }, { cve: "CVE-2018-2964", discovery_date: "2018-07-17T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1602142", }, ], notes: [ { category: "description", text: "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 8u172 and 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", title: "Vulnerability description", }, { category: "summary", text: "JDK: unspecified vulnerability fixed in 8u181 and 10.0.2 (Deployment)", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-2964", }, { category: "external", summary: "RHBZ#1602142", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1602142", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-2964", url: "https://www.cve.org/CVERecord?id=CVE-2018-2964", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-2964", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-2964", }, { category: "external", summary: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA", url: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA", }, ], release_date: "2018-07-17T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2018-07-24T21:09:42+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Oracle Java must be restarted for this update to take effect.", product_ids: [ "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2018:2256", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", ], }, ], threats: [ { category: "impact", details: "Critical", }, ], title: "JDK: unspecified vulnerability fixed in 8u181 and 10.0.2 (Deployment)", }, { cve: "CVE-2018-2973", discovery_date: "2018-07-17T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1602145", }, ], notes: [ { category: "description", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SSL/TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", title: "Vulnerability description", }, { category: "summary", text: "JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (JSSE)", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-2973", }, { category: "external", summary: "RHBZ#1602145", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1602145", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-2973", url: "https://www.cve.org/CVERecord?id=CVE-2018-2973", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-2973", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-2973", }, { category: "external", summary: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA", url: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA", }, ], release_date: "2018-07-17T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2018-07-24T21:09:42+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Oracle Java must be restarted for this update to take effect.", product_ids: [ "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2018:2256", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.9, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (JSSE)", }, ], }
RHSA-2018:2253
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Critical", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for java-1.8.0-oracle is now available for Oracle Java for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "Oracle Java SE version 8 includes the Oracle Java Runtime Environment and the Oracle Java Software Development Kit.\n\nThis update upgrades Oracle Java SE 8 to version 8 Update 181.\n\nSecurity Fix(es):\n\n* Oracle JDK: unspecified vulnerability fixed in 7u191, 8u181, and 10.0.2 (JavaFX) (CVE-2018-2941)\n\n* Oracle JDK: unspecified vulnerability fixed in 8u181 and 10.0.2 (Deployment) (CVE-2018-2964)\n\n* Oracle JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (Libraries) (CVE-2018-2940)\n\n* OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547) (CVE-2018-2952)\n\n* Oracle JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (JSSE) (CVE-2018-2973)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2018:2253", url: "https://access.redhat.com/errata/RHSA-2018:2253", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#critical", url: "https://access.redhat.com/security/updates/classification/#critical", }, { category: "external", summary: "1600925", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1600925", }, { category: "external", summary: "1602142", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1602142", }, { category: "external", summary: "1602143", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1602143", }, { category: "external", summary: "1602145", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1602145", }, { category: "external", summary: "1602146", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1602146", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2253.json", }, ], title: "Red Hat Security Advisory: java-1.8.0-oracle security update", tracking: { current_release_date: "2024-11-15T02:11:43+00:00", generator: { date: "2024-11-15T02:11:43+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2018:2253", initial_release_date: "2018-07-24T21:13:37+00:00", revision_history: [ { date: "2018-07-24T21:13:37+00:00", number: "1", summary: "Initial version", }, { date: "2018-07-24T21:13:37+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-15T02:11:43+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Oracle Java for Red Hat Enterprise Linux Client (v. 7)", product: { name: "Oracle Java for Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-OracleJava-7.5.Z", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_extras_oracle_java:7", }, }, }, { category: "product_name", name: "Oracle Java for Red Hat Enterprise Linux Compute Node (v. 7)", product: { name: "Oracle Java for Red Hat Enterprise Linux Compute Node (v. 7)", product_id: "7ComputeNode-OracleJava-7.5.Z", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_extras_oracle_java:7", }, }, }, { category: "product_name", name: "Oracle Java for Red Hat Enterprise Linux Server (v. 7)", product: { name: "Oracle Java for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-OracleJava-7.5.Z", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_extras_oracle_java:7", }, }, }, { category: "product_name", name: "Oracle Java for Red Hat Enterprise Linux Workstation (v. 7)", product: { name: "Oracle Java for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-OracleJava-7.5.Z", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_extras_oracle_java:7", }, }, }, ], category: "product_family", name: "Oracle Java for Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", product: { name: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", product_id: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/java-1.8.0-oracle-jdbc@1.8.0.181-1jpp.2.el7?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", product: { name: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", product_id: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/java-1.8.0-oracle-src@1.8.0.181-1jpp.2.el7?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", product: { name: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", product_id: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/java-1.8.0-oracle-plugin@1.8.0.181-1jpp.2.el7?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", product: { name: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", product_id: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/java-1.8.0-oracle-javafx@1.8.0.181-1jpp.2.el7?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", product: { name: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", product_id: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/java-1.8.0-oracle-devel@1.8.0.181-1jpp.2.el7?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", product: { name: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", product_id: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/java-1.8.0-oracle@1.8.0.181-1jpp.2.el7?arch=x86_64&epoch=1", }, }, }, ], category: "architecture", name: "x86_64", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", }, product_reference: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", relates_to_product_reference: "7Client-OracleJava-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", }, product_reference: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", relates_to_product_reference: "7Client-OracleJava-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", }, product_reference: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", relates_to_product_reference: "7Client-OracleJava-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", }, product_reference: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", relates_to_product_reference: "7Client-OracleJava-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", }, product_reference: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", relates_to_product_reference: "7Client-OracleJava-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", }, product_reference: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", relates_to_product_reference: "7Client-OracleJava-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Compute Node (v. 7)", product_id: "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", }, product_reference: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", relates_to_product_reference: "7ComputeNode-OracleJava-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Compute Node (v. 7)", product_id: "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", }, product_reference: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", relates_to_product_reference: "7ComputeNode-OracleJava-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Compute Node (v. 7)", product_id: "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", }, product_reference: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", relates_to_product_reference: "7ComputeNode-OracleJava-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Compute Node (v. 7)", product_id: "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", }, product_reference: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", relates_to_product_reference: "7ComputeNode-OracleJava-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Compute Node (v. 7)", product_id: "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", }, product_reference: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", relates_to_product_reference: "7ComputeNode-OracleJava-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Compute Node (v. 7)", product_id: "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", }, product_reference: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", relates_to_product_reference: "7ComputeNode-OracleJava-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", }, product_reference: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", relates_to_product_reference: "7Server-OracleJava-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", }, product_reference: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", relates_to_product_reference: "7Server-OracleJava-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", }, product_reference: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", relates_to_product_reference: "7Server-OracleJava-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", }, product_reference: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", relates_to_product_reference: "7Server-OracleJava-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", }, product_reference: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", relates_to_product_reference: "7Server-OracleJava-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", }, product_reference: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", relates_to_product_reference: "7Server-OracleJava-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", }, product_reference: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", relates_to_product_reference: "7Workstation-OracleJava-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", }, product_reference: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", relates_to_product_reference: "7Workstation-OracleJava-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", }, product_reference: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", relates_to_product_reference: "7Workstation-OracleJava-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", }, product_reference: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", relates_to_product_reference: "7Workstation-OracleJava-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", }, product_reference: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", relates_to_product_reference: "7Workstation-OracleJava-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", }, product_reference: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", relates_to_product_reference: "7Workstation-OracleJava-7.5.Z", }, ], }, vulnerabilities: [ { cve: "CVE-2018-2940", discovery_date: "2018-07-17T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1602146", }, ], notes: [ { category: "description", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N).", title: "Vulnerability description", }, { category: "summary", text: "JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (Libraries)", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-2940", }, { category: "external", summary: "RHBZ#1602146", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1602146", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-2940", url: "https://www.cve.org/CVERecord?id=CVE-2018-2940", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-2940", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-2940", }, { category: "external", summary: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA", url: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA", }, ], release_date: "2018-07-17T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2018-07-24T21:13:37+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Oracle Java must be restarted for this update to take effect.", product_ids: [ "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2018:2253", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (Libraries)", }, { cve: "CVE-2018-2941", discovery_date: "2018-07-17T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1602143", }, ], notes: [ { category: "description", text: "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: JavaFX). Supported versions that are affected are Java SE: 7u181, 8u172 and 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", title: "Vulnerability description", }, { category: "summary", text: "JDK: unspecified vulnerability fixed in 7u191, 8u181, and 10.0.2 (JavaFX)", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-2941", }, { category: "external", summary: "RHBZ#1602143", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1602143", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-2941", url: "https://www.cve.org/CVERecord?id=CVE-2018-2941", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-2941", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-2941", }, { category: "external", summary: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA", url: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA", }, ], release_date: "2018-07-17T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2018-07-24T21:13:37+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Oracle Java must be restarted for this update to take effect.", product_ids: [ "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2018:2253", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Critical", }, ], title: "JDK: unspecified vulnerability fixed in 7u191, 8u181, and 10.0.2 (JavaFX)", }, { cve: "CVE-2018-2952", cwe: { id: "CWE-770", name: "Allocation of Resources Without Limits or Throttling", }, discovery_date: "2018-07-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1600925", }, ], notes: [ { category: "description", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171; JRockit: R28.3.18. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "Vulnerability description", }, { category: "summary", text: "OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547)", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-2952", }, { category: "external", summary: "RHBZ#1600925", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1600925", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-2952", url: "https://www.cve.org/CVERecord?id=CVE-2018-2952", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-2952", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-2952", }, ], release_date: "2018-07-17T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2018-07-24T21:13:37+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Oracle Java must be restarted for this update to take effect.", product_ids: [ "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2018:2253", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 3.7, baseSeverity: "LOW", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547)", }, { cve: "CVE-2018-2964", discovery_date: "2018-07-17T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1602142", }, ], notes: [ { category: "description", text: "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 8u172 and 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", title: "Vulnerability description", }, { category: "summary", text: "JDK: unspecified vulnerability fixed in 8u181 and 10.0.2 (Deployment)", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-2964", }, { category: "external", summary: "RHBZ#1602142", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1602142", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-2964", url: "https://www.cve.org/CVERecord?id=CVE-2018-2964", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-2964", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-2964", }, { category: "external", summary: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA", url: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA", }, ], release_date: "2018-07-17T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2018-07-24T21:13:37+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Oracle Java must be restarted for this update to take effect.", product_ids: [ "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2018:2253", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Critical", }, ], title: "JDK: unspecified vulnerability fixed in 8u181 and 10.0.2 (Deployment)", }, { cve: "CVE-2018-2973", discovery_date: "2018-07-17T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1602145", }, ], notes: [ { category: "description", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SSL/TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", title: "Vulnerability description", }, { category: "summary", text: "JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (JSSE)", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-2973", }, { category: "external", summary: "RHBZ#1602145", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1602145", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-2973", url: "https://www.cve.org/CVERecord?id=CVE-2018-2973", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-2973", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-2973", }, { category: "external", summary: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA", url: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA", }, ], release_date: "2018-07-17T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2018-07-24T21:13:37+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Oracle Java must be restarted for this update to take effect.", product_ids: [ "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2018:2253", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.9, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (JSSE)", }, ], }
rhsa-2018:2253
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Critical", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for java-1.8.0-oracle is now available for Oracle Java for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "Oracle Java SE version 8 includes the Oracle Java Runtime Environment and the Oracle Java Software Development Kit.\n\nThis update upgrades Oracle Java SE 8 to version 8 Update 181.\n\nSecurity Fix(es):\n\n* Oracle JDK: unspecified vulnerability fixed in 7u191, 8u181, and 10.0.2 (JavaFX) (CVE-2018-2941)\n\n* Oracle JDK: unspecified vulnerability fixed in 8u181 and 10.0.2 (Deployment) (CVE-2018-2964)\n\n* Oracle JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (Libraries) (CVE-2018-2940)\n\n* OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547) (CVE-2018-2952)\n\n* Oracle JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (JSSE) (CVE-2018-2973)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2018:2253", url: "https://access.redhat.com/errata/RHSA-2018:2253", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#critical", url: "https://access.redhat.com/security/updates/classification/#critical", }, { category: "external", summary: "1600925", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1600925", }, { category: "external", summary: "1602142", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1602142", }, { category: "external", summary: "1602143", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1602143", }, { category: "external", summary: "1602145", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1602145", }, { category: "external", summary: "1602146", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1602146", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2253.json", }, ], title: "Red Hat Security Advisory: java-1.8.0-oracle security update", tracking: { current_release_date: "2024-11-15T02:11:43+00:00", generator: { date: "2024-11-15T02:11:43+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2018:2253", initial_release_date: "2018-07-24T21:13:37+00:00", revision_history: [ { date: "2018-07-24T21:13:37+00:00", number: "1", summary: "Initial version", }, { date: "2018-07-24T21:13:37+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-15T02:11:43+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Oracle Java for Red Hat Enterprise Linux Client (v. 7)", product: { name: "Oracle Java for Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-OracleJava-7.5.Z", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_extras_oracle_java:7", }, }, }, { category: "product_name", name: "Oracle Java for Red Hat Enterprise Linux Compute Node (v. 7)", product: { name: "Oracle Java for Red Hat Enterprise Linux Compute Node (v. 7)", product_id: "7ComputeNode-OracleJava-7.5.Z", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_extras_oracle_java:7", }, }, }, { category: "product_name", name: "Oracle Java for Red Hat Enterprise Linux Server (v. 7)", product: { name: "Oracle Java for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-OracleJava-7.5.Z", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_extras_oracle_java:7", }, }, }, { category: "product_name", name: "Oracle Java for Red Hat Enterprise Linux Workstation (v. 7)", product: { name: "Oracle Java for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-OracleJava-7.5.Z", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_extras_oracle_java:7", }, }, }, ], category: "product_family", name: "Oracle Java for Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", product: { name: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", product_id: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/java-1.8.0-oracle-jdbc@1.8.0.181-1jpp.2.el7?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", product: { name: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", product_id: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/java-1.8.0-oracle-src@1.8.0.181-1jpp.2.el7?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", product: { name: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", product_id: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/java-1.8.0-oracle-plugin@1.8.0.181-1jpp.2.el7?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", product: { name: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", product_id: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/java-1.8.0-oracle-javafx@1.8.0.181-1jpp.2.el7?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", product: { name: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", product_id: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/java-1.8.0-oracle-devel@1.8.0.181-1jpp.2.el7?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", product: { name: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", product_id: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/java-1.8.0-oracle@1.8.0.181-1jpp.2.el7?arch=x86_64&epoch=1", }, }, }, ], category: "architecture", name: "x86_64", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", }, product_reference: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", relates_to_product_reference: "7Client-OracleJava-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", }, product_reference: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", relates_to_product_reference: "7Client-OracleJava-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", }, product_reference: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", relates_to_product_reference: "7Client-OracleJava-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", }, product_reference: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", relates_to_product_reference: "7Client-OracleJava-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", }, product_reference: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", relates_to_product_reference: "7Client-OracleJava-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", }, product_reference: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", relates_to_product_reference: "7Client-OracleJava-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Compute Node (v. 7)", product_id: "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", }, product_reference: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", relates_to_product_reference: "7ComputeNode-OracleJava-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Compute Node (v. 7)", product_id: "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", }, product_reference: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", relates_to_product_reference: "7ComputeNode-OracleJava-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Compute Node (v. 7)", product_id: "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", }, product_reference: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", relates_to_product_reference: "7ComputeNode-OracleJava-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Compute Node (v. 7)", product_id: "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", }, product_reference: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", relates_to_product_reference: "7ComputeNode-OracleJava-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Compute Node (v. 7)", product_id: "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", }, product_reference: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", relates_to_product_reference: "7ComputeNode-OracleJava-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Compute Node (v. 7)", product_id: "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", }, product_reference: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", relates_to_product_reference: "7ComputeNode-OracleJava-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", }, product_reference: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", relates_to_product_reference: "7Server-OracleJava-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", }, product_reference: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", relates_to_product_reference: "7Server-OracleJava-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", }, product_reference: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", relates_to_product_reference: "7Server-OracleJava-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", }, product_reference: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", relates_to_product_reference: "7Server-OracleJava-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", }, product_reference: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", relates_to_product_reference: "7Server-OracleJava-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", }, product_reference: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", relates_to_product_reference: "7Server-OracleJava-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", }, product_reference: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", relates_to_product_reference: "7Workstation-OracleJava-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", }, product_reference: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", relates_to_product_reference: "7Workstation-OracleJava-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", }, product_reference: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", relates_to_product_reference: "7Workstation-OracleJava-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", }, product_reference: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", relates_to_product_reference: "7Workstation-OracleJava-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", }, product_reference: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", relates_to_product_reference: "7Workstation-OracleJava-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", }, product_reference: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", relates_to_product_reference: "7Workstation-OracleJava-7.5.Z", }, ], }, vulnerabilities: [ { cve: "CVE-2018-2940", discovery_date: "2018-07-17T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1602146", }, ], notes: [ { category: "description", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N).", title: "Vulnerability description", }, { category: "summary", text: "JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (Libraries)", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-2940", }, { category: "external", summary: "RHBZ#1602146", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1602146", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-2940", url: "https://www.cve.org/CVERecord?id=CVE-2018-2940", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-2940", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-2940", }, { category: "external", summary: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA", url: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA", }, ], release_date: "2018-07-17T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2018-07-24T21:13:37+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Oracle Java must be restarted for this update to take effect.", product_ids: [ "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2018:2253", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (Libraries)", }, { cve: "CVE-2018-2941", discovery_date: "2018-07-17T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1602143", }, ], notes: [ { category: "description", text: "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: JavaFX). Supported versions that are affected are Java SE: 7u181, 8u172 and 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", title: "Vulnerability description", }, { category: "summary", text: "JDK: unspecified vulnerability fixed in 7u191, 8u181, and 10.0.2 (JavaFX)", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-2941", }, { category: "external", summary: "RHBZ#1602143", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1602143", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-2941", url: "https://www.cve.org/CVERecord?id=CVE-2018-2941", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-2941", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-2941", }, { category: "external", summary: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA", url: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA", }, ], release_date: "2018-07-17T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2018-07-24T21:13:37+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Oracle Java must be restarted for this update to take effect.", product_ids: [ "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2018:2253", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Critical", }, ], title: "JDK: unspecified vulnerability fixed in 7u191, 8u181, and 10.0.2 (JavaFX)", }, { cve: "CVE-2018-2952", cwe: { id: "CWE-770", name: "Allocation of Resources Without Limits or Throttling", }, discovery_date: "2018-07-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1600925", }, ], notes: [ { category: "description", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171; JRockit: R28.3.18. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "Vulnerability description", }, { category: "summary", text: "OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547)", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-2952", }, { category: "external", summary: "RHBZ#1600925", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1600925", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-2952", url: "https://www.cve.org/CVERecord?id=CVE-2018-2952", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-2952", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-2952", }, ], release_date: "2018-07-17T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2018-07-24T21:13:37+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Oracle Java must be restarted for this update to take effect.", product_ids: [ "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2018:2253", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 3.7, baseSeverity: "LOW", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547)", }, { cve: "CVE-2018-2964", discovery_date: "2018-07-17T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1602142", }, ], notes: [ { category: "description", text: "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 8u172 and 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", title: "Vulnerability description", }, { category: "summary", text: "JDK: unspecified vulnerability fixed in 8u181 and 10.0.2 (Deployment)", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-2964", }, { category: "external", summary: "RHBZ#1602142", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1602142", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-2964", url: "https://www.cve.org/CVERecord?id=CVE-2018-2964", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-2964", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-2964", }, { category: "external", summary: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA", url: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA", }, ], release_date: "2018-07-17T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2018-07-24T21:13:37+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Oracle Java must be restarted for this update to take effect.", product_ids: [ "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2018:2253", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Critical", }, ], title: "JDK: unspecified vulnerability fixed in 8u181 and 10.0.2 (Deployment)", }, { cve: "CVE-2018-2973", discovery_date: "2018-07-17T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1602145", }, ], notes: [ { category: "description", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SSL/TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", title: "Vulnerability description", }, { category: "summary", text: "JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (JSSE)", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-2973", }, { category: "external", summary: "RHBZ#1602145", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1602145", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-2973", url: "https://www.cve.org/CVERecord?id=CVE-2018-2973", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-2973", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-2973", }, { category: "external", summary: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA", url: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA", }, ], release_date: "2018-07-17T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2018-07-24T21:13:37+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Oracle Java must be restarted for this update to take effect.", product_ids: [ "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2018:2253", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.9, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (JSSE)", }, ], }
rhsa-2018_2253
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Critical", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for java-1.8.0-oracle is now available for Oracle Java for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "Oracle Java SE version 8 includes the Oracle Java Runtime Environment and the Oracle Java Software Development Kit.\n\nThis update upgrades Oracle Java SE 8 to version 8 Update 181.\n\nSecurity Fix(es):\n\n* Oracle JDK: unspecified vulnerability fixed in 7u191, 8u181, and 10.0.2 (JavaFX) (CVE-2018-2941)\n\n* Oracle JDK: unspecified vulnerability fixed in 8u181 and 10.0.2 (Deployment) (CVE-2018-2964)\n\n* Oracle JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (Libraries) (CVE-2018-2940)\n\n* OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547) (CVE-2018-2952)\n\n* Oracle JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (JSSE) (CVE-2018-2973)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2018:2253", url: "https://access.redhat.com/errata/RHSA-2018:2253", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#critical", url: "https://access.redhat.com/security/updates/classification/#critical", }, { category: "external", summary: "1600925", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1600925", }, { category: "external", summary: "1602142", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1602142", }, { category: "external", summary: "1602143", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1602143", }, { category: "external", summary: "1602145", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1602145", }, { category: "external", summary: "1602146", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1602146", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2253.json", }, ], title: "Red Hat Security Advisory: java-1.8.0-oracle security update", tracking: { current_release_date: "2024-11-15T02:11:43+00:00", generator: { date: "2024-11-15T02:11:43+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2018:2253", initial_release_date: "2018-07-24T21:13:37+00:00", revision_history: [ { date: "2018-07-24T21:13:37+00:00", number: "1", summary: "Initial version", }, { date: "2018-07-24T21:13:37+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-15T02:11:43+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Oracle Java for Red Hat Enterprise Linux Client (v. 7)", product: { name: "Oracle Java for Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-OracleJava-7.5.Z", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_extras_oracle_java:7", }, }, }, { category: "product_name", name: "Oracle Java for Red Hat Enterprise Linux Compute Node (v. 7)", product: { name: "Oracle Java for Red Hat Enterprise Linux Compute Node (v. 7)", product_id: "7ComputeNode-OracleJava-7.5.Z", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_extras_oracle_java:7", }, }, }, { category: "product_name", name: "Oracle Java for Red Hat Enterprise Linux Server (v. 7)", product: { name: "Oracle Java for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-OracleJava-7.5.Z", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_extras_oracle_java:7", }, }, }, { category: "product_name", name: "Oracle Java for Red Hat Enterprise Linux Workstation (v. 7)", product: { name: "Oracle Java for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-OracleJava-7.5.Z", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_extras_oracle_java:7", }, }, }, ], category: "product_family", name: "Oracle Java for Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", product: { name: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", product_id: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/java-1.8.0-oracle-jdbc@1.8.0.181-1jpp.2.el7?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", product: { name: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", product_id: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/java-1.8.0-oracle-src@1.8.0.181-1jpp.2.el7?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", product: { name: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", product_id: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/java-1.8.0-oracle-plugin@1.8.0.181-1jpp.2.el7?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", product: { name: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", product_id: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/java-1.8.0-oracle-javafx@1.8.0.181-1jpp.2.el7?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", product: { name: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", product_id: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/java-1.8.0-oracle-devel@1.8.0.181-1jpp.2.el7?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", product: { name: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", product_id: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/java-1.8.0-oracle@1.8.0.181-1jpp.2.el7?arch=x86_64&epoch=1", }, }, }, ], category: "architecture", name: "x86_64", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", }, product_reference: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", relates_to_product_reference: "7Client-OracleJava-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", }, product_reference: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", relates_to_product_reference: "7Client-OracleJava-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", }, product_reference: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", relates_to_product_reference: "7Client-OracleJava-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", }, product_reference: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", relates_to_product_reference: "7Client-OracleJava-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", }, product_reference: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", relates_to_product_reference: "7Client-OracleJava-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", }, product_reference: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", relates_to_product_reference: "7Client-OracleJava-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Compute Node (v. 7)", product_id: "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", }, product_reference: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", relates_to_product_reference: "7ComputeNode-OracleJava-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Compute Node (v. 7)", product_id: "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", }, product_reference: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", relates_to_product_reference: "7ComputeNode-OracleJava-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Compute Node (v. 7)", product_id: "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", }, product_reference: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", relates_to_product_reference: "7ComputeNode-OracleJava-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Compute Node (v. 7)", product_id: "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", }, product_reference: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", relates_to_product_reference: "7ComputeNode-OracleJava-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Compute Node (v. 7)", product_id: "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", }, product_reference: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", relates_to_product_reference: "7ComputeNode-OracleJava-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Compute Node (v. 7)", product_id: "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", }, product_reference: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", relates_to_product_reference: "7ComputeNode-OracleJava-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", }, product_reference: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", relates_to_product_reference: "7Server-OracleJava-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", }, product_reference: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", relates_to_product_reference: "7Server-OracleJava-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", }, product_reference: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", relates_to_product_reference: "7Server-OracleJava-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", }, product_reference: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", relates_to_product_reference: "7Server-OracleJava-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", }, product_reference: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", relates_to_product_reference: "7Server-OracleJava-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", }, product_reference: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", relates_to_product_reference: "7Server-OracleJava-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", }, product_reference: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", relates_to_product_reference: "7Workstation-OracleJava-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", }, product_reference: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", relates_to_product_reference: "7Workstation-OracleJava-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", }, product_reference: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", relates_to_product_reference: "7Workstation-OracleJava-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", }, product_reference: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", relates_to_product_reference: "7Workstation-OracleJava-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", }, product_reference: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", relates_to_product_reference: "7Workstation-OracleJava-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", }, product_reference: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", relates_to_product_reference: "7Workstation-OracleJava-7.5.Z", }, ], }, vulnerabilities: [ { cve: "CVE-2018-2940", discovery_date: "2018-07-17T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1602146", }, ], notes: [ { category: "description", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N).", title: "Vulnerability description", }, { category: "summary", text: "JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (Libraries)", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-2940", }, { category: "external", summary: "RHBZ#1602146", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1602146", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-2940", url: "https://www.cve.org/CVERecord?id=CVE-2018-2940", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-2940", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-2940", }, { category: "external", summary: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA", url: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA", }, ], release_date: "2018-07-17T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2018-07-24T21:13:37+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Oracle Java must be restarted for this update to take effect.", product_ids: [ "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2018:2253", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (Libraries)", }, { cve: "CVE-2018-2941", discovery_date: "2018-07-17T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1602143", }, ], notes: [ { category: "description", text: "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: JavaFX). Supported versions that are affected are Java SE: 7u181, 8u172 and 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", title: "Vulnerability description", }, { category: "summary", text: "JDK: unspecified vulnerability fixed in 7u191, 8u181, and 10.0.2 (JavaFX)", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-2941", }, { category: "external", summary: "RHBZ#1602143", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1602143", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-2941", url: "https://www.cve.org/CVERecord?id=CVE-2018-2941", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-2941", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-2941", }, { category: "external", summary: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA", url: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA", }, ], release_date: "2018-07-17T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2018-07-24T21:13:37+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Oracle Java must be restarted for this update to take effect.", product_ids: [ "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2018:2253", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Critical", }, ], title: "JDK: unspecified vulnerability fixed in 7u191, 8u181, and 10.0.2 (JavaFX)", }, { cve: "CVE-2018-2952", cwe: { id: "CWE-770", name: "Allocation of Resources Without Limits or Throttling", }, discovery_date: "2018-07-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1600925", }, ], notes: [ { category: "description", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171; JRockit: R28.3.18. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "Vulnerability description", }, { category: "summary", text: "OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547)", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-2952", }, { category: "external", summary: "RHBZ#1600925", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1600925", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-2952", url: "https://www.cve.org/CVERecord?id=CVE-2018-2952", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-2952", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-2952", }, ], release_date: "2018-07-17T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2018-07-24T21:13:37+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Oracle Java must be restarted for this update to take effect.", product_ids: [ "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2018:2253", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 3.7, baseSeverity: "LOW", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547)", }, { cve: "CVE-2018-2964", discovery_date: "2018-07-17T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1602142", }, ], notes: [ { category: "description", text: "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 8u172 and 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", title: "Vulnerability description", }, { category: "summary", text: "JDK: unspecified vulnerability fixed in 8u181 and 10.0.2 (Deployment)", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-2964", }, { category: "external", summary: "RHBZ#1602142", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1602142", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-2964", url: "https://www.cve.org/CVERecord?id=CVE-2018-2964", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-2964", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-2964", }, { category: "external", summary: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA", url: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA", }, ], release_date: "2018-07-17T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2018-07-24T21:13:37+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Oracle Java must be restarted for this update to take effect.", product_ids: [ "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2018:2253", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Critical", }, ], title: "JDK: unspecified vulnerability fixed in 8u181 and 10.0.2 (Deployment)", }, { cve: "CVE-2018-2973", discovery_date: "2018-07-17T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1602145", }, ], notes: [ { category: "description", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SSL/TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", title: "Vulnerability description", }, { category: "summary", text: "JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (JSSE)", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-2973", }, { category: "external", summary: "RHBZ#1602145", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1602145", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-2973", url: "https://www.cve.org/CVERecord?id=CVE-2018-2973", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-2973", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-2973", }, { category: "external", summary: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA", url: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA", }, ], release_date: "2018-07-17T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2018-07-24T21:13:37+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Oracle Java must be restarted for this update to take effect.", product_ids: [ "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2018:2253", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.9, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (JSSE)", }, ], }
rhsa-2018:2256
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Critical", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for java-1.8.0-oracle is now available for Oracle Java for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "Oracle Java SE version 8 includes the Oracle Java Runtime Environment and the Oracle Java Software Development Kit.\n\nThis update upgrades Oracle Java SE 8 to version 8 Update 181.\n\nSecurity Fix(es):\n\n* Oracle JDK: unspecified vulnerability fixed in 7u191, 8u181, and 10.0.2 (JavaFX) (CVE-2018-2941)\n\n* Oracle JDK: unspecified vulnerability fixed in 8u181 and 10.0.2 (Deployment) (CVE-2018-2964)\n\n* Oracle JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (Libraries) (CVE-2018-2940)\n\n* OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547) (CVE-2018-2952)\n\n* Oracle JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (JSSE) (CVE-2018-2973)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2018:2256", url: "https://access.redhat.com/errata/RHSA-2018:2256", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#critical", url: "https://access.redhat.com/security/updates/classification/#critical", }, { category: "external", summary: "1600925", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1600925", }, { category: "external", summary: "1602142", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1602142", }, { category: "external", summary: "1602143", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1602143", }, { category: "external", summary: "1602145", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1602145", }, { category: "external", summary: "1602146", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1602146", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2256.json", }, ], title: "Red Hat Security Advisory: java-1.8.0-oracle security update", tracking: { current_release_date: "2024-11-15T02:11:58+00:00", generator: { date: "2024-11-15T02:11:58+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2018:2256", initial_release_date: "2018-07-24T21:09:42+00:00", revision_history: [ { date: "2018-07-24T21:09:42+00:00", number: "1", summary: "Initial version", }, { date: "2018-07-24T21:09:42+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-15T02:11:58+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Oracle Java for Red Hat Enterprise Linux Desktop 6", product: { name: "Oracle Java for Red Hat Enterprise Linux Desktop 6", product_id: "6Client-OracleJava-6.10.Z", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_extras_oracle_java:6", }, }, }, { category: "product_name", name: "Oracle Java for Red Hat Enterprise Linux HPC Node 6", product: { name: "Oracle Java for Red Hat Enterprise Linux HPC Node 6", product_id: "6ComputeNode-OracleJava-6.10.Z", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_extras_oracle_java:6", }, }, }, { category: "product_name", name: "Oracle Java for Red Hat Enterprise Linux Server 6", product: { name: "Oracle Java for Red Hat Enterprise Linux Server 6", product_id: "6Server-OracleJava-6.10.Z", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_extras_oracle_java:6", }, }, }, { category: "product_name", name: "Oracle Java for Red Hat Enterprise Linux Workstation 6", product: { name: "Oracle Java for Red Hat Enterprise Linux Workstation 6", product_id: "6Workstation-OracleJava-6.10.Z", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_extras_oracle_java:6", }, }, }, ], category: "product_family", name: "Oracle Java for Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", product: { name: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", product_id: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/java-1.8.0-oracle-jdbc@1.8.0.181-1jpp.2.el6?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", product: { name: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", product_id: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/java-1.8.0-oracle-src@1.8.0.181-1jpp.2.el6?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", product: { name: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", product_id: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/java-1.8.0-oracle-javafx@1.8.0.181-1jpp.2.el6?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", product: { name: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", product_id: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/java-1.8.0-oracle-plugin@1.8.0.181-1jpp.2.el6?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", product: { name: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", product_id: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/java-1.8.0-oracle-devel@1.8.0.181-1jpp.2.el6?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", product: { name: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", product_id: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/java-1.8.0-oracle@1.8.0.181-1jpp.2.el6?arch=x86_64&epoch=1", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", product: { name: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", product_id: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", product_identification_helper: { purl: "pkg:rpm/redhat/java-1.8.0-oracle-jdbc@1.8.0.181-1jpp.2.el6?arch=i686&epoch=1", }, }, }, { category: "product_version", name: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", product: { name: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", product_id: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", product_identification_helper: { purl: "pkg:rpm/redhat/java-1.8.0-oracle-src@1.8.0.181-1jpp.2.el6?arch=i686&epoch=1", }, }, }, { category: "product_version", name: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", product: { name: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", product_id: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", product_identification_helper: { purl: "pkg:rpm/redhat/java-1.8.0-oracle-javafx@1.8.0.181-1jpp.2.el6?arch=i686&epoch=1", }, }, }, { category: "product_version", name: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", product: { name: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", product_id: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", product_identification_helper: { purl: "pkg:rpm/redhat/java-1.8.0-oracle-plugin@1.8.0.181-1jpp.2.el6?arch=i686&epoch=1", }, }, }, { category: "product_version", name: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", product: { name: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", product_id: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", product_identification_helper: { purl: "pkg:rpm/redhat/java-1.8.0-oracle-devel@1.8.0.181-1jpp.2.el6?arch=i686&epoch=1", }, }, }, { category: "product_version", name: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", product: { name: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", product_id: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", product_identification_helper: { purl: "pkg:rpm/redhat/java-1.8.0-oracle@1.8.0.181-1jpp.2.el6?arch=i686&epoch=1", }, }, }, ], category: "architecture", name: "i686", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Desktop 6", product_id: "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", }, product_reference: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", relates_to_product_reference: "6Client-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Desktop 6", product_id: "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", }, product_reference: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", relates_to_product_reference: "6Client-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Desktop 6", product_id: "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", }, product_reference: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", relates_to_product_reference: "6Client-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Desktop 6", product_id: "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", }, product_reference: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", relates_to_product_reference: "6Client-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Desktop 6", product_id: "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", }, product_reference: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", relates_to_product_reference: "6Client-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Desktop 6", product_id: "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", }, product_reference: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", relates_to_product_reference: "6Client-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Desktop 6", product_id: "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", }, product_reference: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", relates_to_product_reference: "6Client-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Desktop 6", product_id: "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", }, product_reference: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", relates_to_product_reference: "6Client-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Desktop 6", product_id: "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", }, product_reference: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", relates_to_product_reference: "6Client-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Desktop 6", product_id: "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", }, product_reference: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", relates_to_product_reference: "6Client-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Desktop 6", product_id: "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", }, product_reference: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", relates_to_product_reference: "6Client-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Desktop 6", product_id: "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", }, product_reference: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", relates_to_product_reference: "6Client-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux HPC Node 6", product_id: "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", }, product_reference: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", relates_to_product_reference: "6ComputeNode-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux HPC Node 6", product_id: "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", }, product_reference: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", relates_to_product_reference: "6ComputeNode-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux HPC Node 6", product_id: "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", }, product_reference: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", relates_to_product_reference: "6ComputeNode-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux HPC Node 6", product_id: "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", }, product_reference: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", relates_to_product_reference: "6ComputeNode-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux HPC Node 6", product_id: "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", }, product_reference: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", relates_to_product_reference: "6ComputeNode-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux HPC Node 6", product_id: "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", }, product_reference: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", relates_to_product_reference: "6ComputeNode-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux HPC Node 6", product_id: "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", }, product_reference: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", relates_to_product_reference: "6ComputeNode-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux HPC Node 6", product_id: "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", }, product_reference: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", relates_to_product_reference: "6ComputeNode-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux HPC Node 6", product_id: "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", }, product_reference: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", relates_to_product_reference: "6ComputeNode-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux HPC Node 6", product_id: "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", }, product_reference: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", relates_to_product_reference: "6ComputeNode-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux HPC Node 6", product_id: "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", }, product_reference: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", relates_to_product_reference: "6ComputeNode-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux HPC Node 6", product_id: "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", }, product_reference: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", relates_to_product_reference: "6ComputeNode-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Server 6", product_id: "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", }, product_reference: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", relates_to_product_reference: "6Server-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Server 6", product_id: "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", }, product_reference: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", relates_to_product_reference: "6Server-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Server 6", product_id: "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", }, product_reference: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", relates_to_product_reference: "6Server-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Server 6", product_id: "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", }, product_reference: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", relates_to_product_reference: "6Server-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Server 6", product_id: "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", }, product_reference: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", relates_to_product_reference: "6Server-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Server 6", product_id: "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", }, product_reference: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", relates_to_product_reference: "6Server-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Server 6", product_id: "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", }, product_reference: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", relates_to_product_reference: "6Server-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Server 6", product_id: "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", }, product_reference: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", relates_to_product_reference: "6Server-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Server 6", product_id: "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", }, product_reference: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", relates_to_product_reference: "6Server-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Server 6", product_id: "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", }, product_reference: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", relates_to_product_reference: "6Server-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Server 6", product_id: "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", }, product_reference: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", relates_to_product_reference: "6Server-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Server 6", product_id: "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", }, product_reference: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", relates_to_product_reference: "6Server-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Workstation 6", product_id: "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", }, product_reference: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", relates_to_product_reference: "6Workstation-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Workstation 6", product_id: "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", }, product_reference: "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", relates_to_product_reference: "6Workstation-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Workstation 6", product_id: "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", }, product_reference: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", relates_to_product_reference: "6Workstation-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Workstation 6", product_id: "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", }, product_reference: "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", relates_to_product_reference: "6Workstation-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Workstation 6", product_id: "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", }, product_reference: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", relates_to_product_reference: "6Workstation-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Workstation 6", product_id: "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", }, product_reference: "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", relates_to_product_reference: "6Workstation-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Workstation 6", product_id: "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", }, product_reference: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", relates_to_product_reference: "6Workstation-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Workstation 6", product_id: "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", }, product_reference: "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", relates_to_product_reference: "6Workstation-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Workstation 6", product_id: "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", }, product_reference: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", relates_to_product_reference: "6Workstation-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Workstation 6", product_id: "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", }, product_reference: "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", relates_to_product_reference: "6Workstation-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Workstation 6", product_id: "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", }, product_reference: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", relates_to_product_reference: "6Workstation-OracleJava-6.10.Z", }, { category: "default_component_of", full_product_name: { name: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Workstation 6", product_id: "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", }, product_reference: "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", relates_to_product_reference: "6Workstation-OracleJava-6.10.Z", }, ], }, vulnerabilities: [ { cve: "CVE-2018-2940", discovery_date: "2018-07-17T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1602146", }, ], notes: [ { category: "description", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N).", title: "Vulnerability description", }, { category: "summary", text: "JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (Libraries)", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-2940", }, { category: "external", summary: "RHBZ#1602146", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1602146", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-2940", url: "https://www.cve.org/CVERecord?id=CVE-2018-2940", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-2940", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-2940", }, { category: "external", summary: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA", url: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA", }, ], release_date: "2018-07-17T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2018-07-24T21:09:42+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Oracle Java must be restarted for this update to take effect.", product_ids: [ "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2018:2256", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (Libraries)", }, { cve: "CVE-2018-2941", discovery_date: "2018-07-17T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1602143", }, ], notes: [ { category: "description", text: "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: JavaFX). Supported versions that are affected are Java SE: 7u181, 8u172 and 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", title: "Vulnerability description", }, { category: "summary", text: "JDK: unspecified vulnerability fixed in 7u191, 8u181, and 10.0.2 (JavaFX)", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-2941", }, { category: "external", summary: "RHBZ#1602143", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1602143", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-2941", url: "https://www.cve.org/CVERecord?id=CVE-2018-2941", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-2941", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-2941", }, { category: "external", summary: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA", url: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA", }, ], release_date: "2018-07-17T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2018-07-24T21:09:42+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Oracle Java must be restarted for this update to take effect.", product_ids: [ "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2018:2256", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", ], }, ], threats: [ { category: "impact", details: "Critical", }, ], title: "JDK: unspecified vulnerability fixed in 7u191, 8u181, and 10.0.2 (JavaFX)", }, { cve: "CVE-2018-2952", cwe: { id: "CWE-770", name: "Allocation of Resources Without Limits or Throttling", }, discovery_date: "2018-07-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1600925", }, ], notes: [ { category: "description", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171; JRockit: R28.3.18. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "Vulnerability description", }, { category: "summary", text: "OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547)", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-2952", }, { category: "external", summary: "RHBZ#1600925", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1600925", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-2952", url: "https://www.cve.org/CVERecord?id=CVE-2018-2952", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-2952", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-2952", }, ], release_date: "2018-07-17T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2018-07-24T21:09:42+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Oracle Java must be restarted for this update to take effect.", product_ids: [ "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2018:2256", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 3.7, baseSeverity: "LOW", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547)", }, { cve: "CVE-2018-2964", discovery_date: "2018-07-17T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1602142", }, ], notes: [ { category: "description", text: "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 8u172 and 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", title: "Vulnerability description", }, { category: "summary", text: "JDK: unspecified vulnerability fixed in 8u181 and 10.0.2 (Deployment)", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-2964", }, { category: "external", summary: "RHBZ#1602142", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1602142", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-2964", url: "https://www.cve.org/CVERecord?id=CVE-2018-2964", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-2964", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-2964", }, { category: "external", summary: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA", url: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA", }, ], release_date: "2018-07-17T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2018-07-24T21:09:42+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Oracle Java must be restarted for this update to take effect.", product_ids: [ "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2018:2256", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", ], }, ], threats: [ { category: "impact", details: "Critical", }, ], title: "JDK: unspecified vulnerability fixed in 8u181 and 10.0.2 (Deployment)", }, { cve: "CVE-2018-2973", discovery_date: "2018-07-17T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1602145", }, ], notes: [ { category: "description", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SSL/TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", title: "Vulnerability description", }, { category: "summary", text: "JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (JSSE)", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-2973", }, { category: "external", summary: "RHBZ#1602145", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1602145", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-2973", url: "https://www.cve.org/CVERecord?id=CVE-2018-2973", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-2973", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-2973", }, { category: "external", summary: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA", url: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA", }, ], release_date: "2018-07-17T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2018-07-24T21:09:42+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Oracle Java must be restarted for this update to take effect.", product_ids: [ "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2018:2256", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.9, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (JSSE)", }, ], }
ghsa-2q7m-m9fq-g952
Vulnerability from github
Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 8u172 and 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
{ affected: [], aliases: [ "CVE-2018-2964", ], database_specific: { cwe_ids: [], github_reviewed: false, github_reviewed_at: null, nvd_published_at: "2018-07-18T13:29:00Z", severity: "HIGH", }, details: "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 8u172 and 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", id: "GHSA-2q7m-m9fq-g952", modified: "2022-05-13T01:17:20Z", published: "2022-05-13T01:17:20Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-2964", }, { type: "WEB", url: "https://access.redhat.com/errata/RHSA-2018:2253", }, { type: "WEB", url: "https://access.redhat.com/errata/RHSA-2018:2256", }, { type: "WEB", url: "https://security.netapp.com/advisory/ntap-20180726-0001", }, { type: "WEB", url: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", }, { type: "WEB", url: "http://www.securityfocus.com/bid/104780", }, { type: "WEB", url: "http://www.securitytracker.com/id/1041302", }, ], schema_version: "1.4.0", severity: [ { score: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", type: "CVSS_V3", }, ], }
gsd-2018-2964
Vulnerability from gsd
{ GSD: { alias: "CVE-2018-2964", description: "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 8u172 and 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", id: "GSD-2018-2964", references: [ "https://www.suse.com/security/cve/CVE-2018-2964.html", "https://access.redhat.com/errata/RHSA-2018:2256", "https://access.redhat.com/errata/RHSA-2018:2253", ], }, gsd: { metadata: { exploitCode: "unknown", remediation: "unknown", reportConfidence: "confirmed", type: "vulnerability", }, osvSchema: { aliases: [ "CVE-2018-2964", ], details: "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 8u172 and 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", id: "GSD-2018-2964", modified: "2023-12-13T01:22:31.638747Z", schema_version: "1.4.0", }, }, namespaces: { "cve.org": { CVE_data_meta: { ASSIGNER: "secalert_us@oracle.com", ID: "CVE-2018-2964", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Java", version: { version_data: [ { version_affected: "=", version_value: "Java SE: 8u172", }, { version_affected: "=", version_value: "10.0.1", }, ], }, }, ], }, vendor_name: "Oracle Corporation", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 8u172 and 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE.", }, ], }, ], }, references: { reference_data: [ { name: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", }, { name: "104780", refsource: "BID", url: "http://www.securityfocus.com/bid/104780", }, { name: "https://security.netapp.com/advisory/ntap-20180726-0001/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20180726-0001/", }, { name: "RHSA-2018:2256", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:2256", }, { name: "RHSA-2018:2253", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:2253", }, { name: "1041302", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1041302", }, ], }, }, "nvd.nist.gov": { configurations: { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:oracle:jre:10.0.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:jdk:10.0.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:jdk:1.8.0:update172:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:jre:1.8.0:update172:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*", cpe_name: [], versionStartIncluding: "9.7", vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*", cpe_name: [], versionStartIncluding: "9.7", vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:sap:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*", cpe_name: [], versionStartIncluding: "9.7", vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:9.6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "11.70.1", versionStartIncluding: "11.0", vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, ], }, cve: { CVE_data_meta: { ASSIGNER: "secalert_us@oracle.com", ID: "CVE-2018-2964", }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "en", value: "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 8u172 and 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], }, ], }, references: { reference_data: [ { name: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", refsource: "CONFIRM", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", }, { name: "104780", refsource: "BID", tags: [ "Broken Link", "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/104780", }, { name: "RHSA-2018:2256", refsource: "REDHAT", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:2256", }, { name: "RHSA-2018:2253", refsource: "REDHAT", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:2253", }, { name: "https://security.netapp.com/advisory/ntap-20180726-0001/", refsource: "CONFIRM", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20180726-0001/", }, { name: "1041302", refsource: "SECTRACK", tags: [ "Broken Link", "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1041302", }, ], }, }, impact: { baseMetricV2: { cvssV2: { accessComplexity: "HIGH", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5.1, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:H/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 4.9, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "MEDIUM", userInteractionRequired: true, }, baseMetricV3: { cvssV3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.3, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.6, impactScore: 6, }, }, lastModifiedDate: "2022-06-27T17:35Z", publishedDate: "2018-07-18T13:29Z", }, }, }
fkie_cve-2018-2964
Vulnerability from fkie_nvd
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:oracle:jdk:1.8.0:update172:*:*:*:*:*:*", matchCriteriaId: "C6BB93E3-3983-40FD-A119-11334C707755", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:jdk:10.0.1:*:*:*:*:*:*:*", matchCriteriaId: "3C103C17-E4A9-40A2-959B-29547D706DFC", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:jre:1.8.0:update172:*:*:*:*:*:*", matchCriteriaId: "788BDADB-6F4E-4DFD-BE2E-2D9B3AFBA5CA", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:jre:10.0.1:*:*:*:*:*:*:*", matchCriteriaId: "1EBB11AD-EA72-4C15-945E-D335A1BF0979", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", matchCriteriaId: "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*", matchCriteriaId: "B55E8D50-99B4-47EC-86F9-699B67D473CE", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", matchCriteriaId: "5C2089EE-5D7F-47EC-8EA5-0F69790564C4", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*", matchCriteriaId: "73F81EC3-4AB0-4CD7-B845-267C5974DE98", versionEndIncluding: "11.70.1", versionStartIncluding: "11.0", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*", matchCriteriaId: "0D9CC59D-6182-4B5E-96B5-226FCD343916", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*", matchCriteriaId: "F1BE6C1F-2565-4E97-92AA-16563E5660A5", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:*", matchCriteriaId: "C18CA4B5-28FD-4199-B1F0-B1E59E920370", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*", matchCriteriaId: "5735E553-9731-4AAC-BCFF-989377F817B3", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*", matchCriteriaId: "FFE0A9D2-9A49-4BF6-BC6F-8249162D8334", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*", matchCriteriaId: "25BBBC1A-228F-45A6-AE95-DB915EDF84BD", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:sap:*:*", matchCriteriaId: "C57D2B31-9696-4451-BA04-D093FFCF7E39", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", matchCriteriaId: "E94F7F59-1785-493F-91A7-5F5EA5E87E4D", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*", matchCriteriaId: "9DBEE506-E864-4FC6-B5D3-7E134438592C", versionStartIncluding: "9.7", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*", matchCriteriaId: "5E73AC99-34AC-4D4B-A946-34F33AAEC4A1", versionStartIncluding: "9.7", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:9.6:*:*:*:*:*:*:*", matchCriteriaId: "FF20DCD2-7BDD-4BD1-8B29-9216E881EA8D", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*", matchCriteriaId: "D4BE7695-11DB-4F04-A469-91A29A83B358", versionStartIncluding: "9.7", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 8u172 and 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", }, { lang: "es", value: "Vulnerabilidad en el componente Java SE de Oracle Java SE (subcomponente: Deployment). Las versiones compatibles que se han visto afectadas son JavaSE: 8u172 y 10.0.1. Una vulnerabilidad difícilmente explotable permite que un atacante sin autenticar que tenga acceso a red por múltiples protocolos comprometa la seguridad de Java SE. Para que los ataques tengan éxito, se necesita la participación de otra persona diferente del atacante y, aunque la vulnerabilidad está presente en Java SE, los ataques podrían afectar seriamente a productos adicionales. Los ataques exitosos a esta vulnerabilidad pueden resultar en la toma de control de Java SE. Nota: esta vulnerabilidad se aplica a implementaciones Java, normalmente en clientes que ejecutan aplicaciones Java Web Start en sandbox o applets Java en sandbox que cargan y ejecutan código que no es de confianza (por ejemplo, código proveniente de internet) y que confían en la sandbox de aislado Java para protegerse. Esta vulnerabilidad no se aplica a implementaciones Java, normalmente en servidores, que solo cargan y ejecutan código de confianza (por ejemplo, código instalado por un administrador). CVSS 3.0 Base Score 8.3 (impactos en la confidencialidad, integridad y disponibilidad). Vector CVSS: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", }, ], id: "CVE-2018-2964", lastModified: "2024-11-21T04:04:51.237", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "HIGH", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5.1, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:H/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 4.9, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.3, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.6, impactScore: 6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-07-18T13:29:03.507", references: [ { source: "secalert_us@oracle.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", }, { source: "secalert_us@oracle.com", tags: [ "Broken Link", "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/104780", }, { source: "secalert_us@oracle.com", tags: [ "Broken Link", "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1041302", }, { source: "secalert_us@oracle.com", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:2253", }, { source: "secalert_us@oracle.com", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:2256", }, { source: "secalert_us@oracle.com", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20180726-0001/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/104780", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1041302", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:2253", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:2256", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20180726-0001/", }, ], sourceIdentifier: "secalert_us@oracle.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Log in or create an account to share your comment.
This schema specifies the format of a comment related to a security advisory.
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.