RHEL 6 : Satellite Server (RHSA-2017:3453)

High Nessus Plugin ID 105267

Synopsis

The remote Red Hat host is missing one or more security updates.

Description

An update for java-1.8.0-ibm is now available for Red Hat Satellite 5.8 and Red Hat Satellite 5.8 ELS.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

IBM Java SE version 8 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit.

This update upgrades IBM Java SE 8 to version 8 SR5-FP5.

Security Fix(es) :

* This update fixes multiple vulnerabilities in the IBM Java Runtime Environment and the IBM Java Software Development Kit. Further information about these flaws can be found on the IBM Java Security Vulnerabilities page listed in the References section. (CVE-2016-9840, CVE-2016-9841, CVE-2016-9842, CVE-2016-9843, CVE-2016-10165, CVE-2017-1289, CVE-2017-3509, CVE-2017-3511, CVE-2017-3533, CVE-2017-3539, CVE-2017-3544, CVE-2017-10053, CVE-2017-10067, CVE-2017-10078, CVE-2017-10087, CVE-2017-10089, CVE-2017-10090, CVE-2017-10096, CVE-2017-10101, CVE-2017-10102, CVE-2017-10105, CVE-2017-10107, CVE-2017-10108, CVE-2017-10109, CVE-2017-10110, CVE-2017-10115, CVE-2017-10116, CVE-2017-10243, CVE-2017-10281, CVE-2017-10285, CVE-2017-10295, CVE-2017-10309, CVE-2017-10345, CVE-2017-10346, CVE-2017-10347, CVE-2017-10348, CVE-2017-10349, CVE-2017-10350, CVE-2017-10355, CVE-2017-10356, CVE-2017-10357, CVE-2017-10388)

For details on how to apply this update, which includes the changes described in this advisory, refer to :

https://access.redhat.com/articles/11258

For this update to take effect, Red Hat Satellite must be restarted ('/usr/sbin/rhn-satellite restart'). All running instances of IBM Java must be restarted for this update to take effect.

Solution

Update the affected java-1.8.0-ibm and / or java-1.8.0-ibm-devel packages.

See Also

https://access.redhat.com/errata/RHSA-2017:3453

https://access.redhat.com/security/cve/cve-2016-9840

https://access.redhat.com/security/cve/cve-2016-9841

https://access.redhat.com/security/cve/cve-2016-9842

https://access.redhat.com/security/cve/cve-2016-9843

https://access.redhat.com/security/cve/cve-2016-10165

https://access.redhat.com/security/cve/cve-2017-1289

https://access.redhat.com/security/cve/cve-2017-3509

https://access.redhat.com/security/cve/cve-2017-3511

https://access.redhat.com/security/cve/cve-2017-3533

https://access.redhat.com/security/cve/cve-2017-3539

https://access.redhat.com/security/cve/cve-2017-3544

https://access.redhat.com/security/cve/cve-2017-10053

https://access.redhat.com/security/cve/cve-2017-10067

https://access.redhat.com/security/cve/cve-2017-10078

https://access.redhat.com/security/cve/cve-2017-10087

https://access.redhat.com/security/cve/cve-2017-10089

https://access.redhat.com/security/cve/cve-2017-10090

https://access.redhat.com/security/cve/cve-2017-10096

https://access.redhat.com/security/cve/cve-2017-10101

https://access.redhat.com/security/cve/cve-2017-10102

https://access.redhat.com/security/cve/cve-2017-10105

https://access.redhat.com/security/cve/cve-2017-10107

https://access.redhat.com/security/cve/cve-2017-10108

https://access.redhat.com/security/cve/cve-2017-10109

https://access.redhat.com/security/cve/cve-2017-10110

https://access.redhat.com/security/cve/cve-2017-10115

https://access.redhat.com/security/cve/cve-2017-10116

https://access.redhat.com/security/cve/cve-2017-10243

https://access.redhat.com/security/cve/cve-2017-10281

https://access.redhat.com/security/cve/cve-2017-10285

https://access.redhat.com/security/cve/cve-2017-10295

https://access.redhat.com/security/cve/cve-2017-10309

https://access.redhat.com/security/cve/cve-2017-10345

https://access.redhat.com/security/cve/cve-2017-10346

https://access.redhat.com/security/cve/cve-2017-10347

https://access.redhat.com/security/cve/cve-2017-10348

https://access.redhat.com/security/cve/cve-2017-10349

https://access.redhat.com/security/cve/cve-2017-10350

https://access.redhat.com/security/cve/cve-2017-10355

https://access.redhat.com/security/cve/cve-2017-10356

https://access.redhat.com/security/cve/cve-2017-10357

https://access.redhat.com/security/cve/cve-2017-10388

Plugin Details

Severity: High

ID: 105267

File Name: redhat-RHSA-2017-3453.nasl

Version: 3.8

Type: local

Agent: unix

Published: 2017/12/15

Updated: 2019/10/24

Dependencies: 12634

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 7.5

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

CVSS v3.0

Base Score: 9.8

Temporal Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:java-1.8.0-ibm, p-cpe:/a:redhat:enterprise_linux:java-1.8.0-ibm-devel, cpe:/o:redhat:enterprise_linux:6

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2017/12/13

Vulnerability Publication Date: 2017/02/03

Reference Information

CVE: CVE-2016-10165, CVE-2016-9840, CVE-2016-9841, CVE-2016-9842, CVE-2016-9843, CVE-2017-10053, CVE-2017-10067, CVE-2017-10078, CVE-2017-10087, CVE-2017-10089, CVE-2017-10090, CVE-2017-10096, CVE-2017-10101, CVE-2017-10102, CVE-2017-10105, CVE-2017-10107, CVE-2017-10108, CVE-2017-10109, CVE-2017-10110, CVE-2017-10115, CVE-2017-10116, CVE-2017-10243, CVE-2017-10281, CVE-2017-10285, CVE-2017-10295, CVE-2017-10309, CVE-2017-10345, CVE-2017-10346, CVE-2017-10347, CVE-2017-10348, CVE-2017-10349, CVE-2017-10350, CVE-2017-10355, CVE-2017-10356, CVE-2017-10357, CVE-2017-10388, CVE-2017-1289, CVE-2017-3509, CVE-2017-3511, CVE-2017-3533, CVE-2017-3539, CVE-2017-3544

RHSA: 2017:3453