RHEL 6 : java-1.8.0-ibm (RHSA-2018:1463)

medium Nessus Plugin ID 109908
New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it is different from CVSS.

VPR Score: 8.1

Synopsis

The remote Red Hat host is missing one or more security updates.

Description

An update for java-1.8.0-ibm is now available for Red Hat Satellite 5.8.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

IBM Java SE version 8 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit.

This update upgrades IBM Java SE 8 to version 8 SR5-FP10.

Security Fix(es) :

* IBM JDK: J9 JVM allows untrusted code running under a security manager to elevate its privileges (CVE-2018-1417)

* Oracle JDK: unspecified vulnerability fixed in 8u161 and 9.0.4 (Deployment) (CVE-2018-2638)

* Oracle JDK: unspecified vulnerability fixed in 8u161 and 9.0.4 (Deployment) (CVE-2018-2639)

* OpenJDK: insufficient validation of the invokeinterface instruction (Hotspot, 8174962) (CVE-2018-2582)

* Oracle JDK: unspecified vulnerability fixed in 8u161 and 9.0.4 (Installer) (CVE-2018-2627)

* OpenJDK: LDAPCertStore insecure handling of LDAP referrals (JNDI, 8186606) (CVE-2018-2633)

* OpenJDK: use of global credentials for HTTP/SPNEGO (JGSS, 8186600) (CVE-2018-2634)

* OpenJDK: SingleEntryRegistry incorrect setup of deserialization filter (JMX, 8186998) (CVE-2018-2637)

* OpenJDK: GTK library loading use-after-free (AWT, 8185325) (CVE-2018-2641)

* Oracle JDK: unspecified vulnerability fixed in 7u171, 8u161, and 9.0.4 (JavaFX) (CVE-2018-2581)

* OpenJDK: LdapLoginModule insufficient username encoding in LDAP query (LDAP, 8178449) (CVE-2018-2588)

* OpenJDK: DnsClient missing source port randomization (JNDI, 8182125) (CVE-2018-2599)

* OpenJDK: loading of classes from untrusted locations (I18n, 8182601) (CVE-2018-2602)

* OpenJDK: DerValue unbounded memory allocation (Libraries, 8182387) (CVE-2018-2603)

* OpenJDK: insufficient strength of key agreement (JCE, 8185292) (CVE-2018-2618)

* OpenJDK: GSS context use-after-free (JGSS, 8186212) (CVE-2018-2629)

* Oracle JDK: unspecified vulnerability fixed in 6u181 and 7u171 (Serialization) (CVE-2018-2657)

* OpenJDK: ArrayBlockingQueue deserialization to an inconsistent state (Libraries, 8189284) (CVE-2018-2663)

* OpenJDK: unbounded memory allocation during deserialization (AWT, 8190289) (CVE-2018-2677)

* OpenJDK: unbounded memory allocation in BasicAttributes deserialization (JNDI, 8191142) (CVE-2018-2678)

* OpenJDK: unsynchronized access to encryption key data (Libraries, 8172525) (CVE-2018-2579)

For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.

Solution

Update the affected java-1.8.0-ibm and / or java-1.8.0-ibm-devel packages.

See Also

https://access.redhat.com/errata/RHSA-2018:1463

https://access.redhat.com/security/cve/cve-2018-1417

https://access.redhat.com/security/cve/cve-2018-2579

https://access.redhat.com/security/cve/cve-2018-2581

https://access.redhat.com/security/cve/cve-2018-2582

https://access.redhat.com/security/cve/cve-2018-2588

https://access.redhat.com/security/cve/cve-2018-2599

https://access.redhat.com/security/cve/cve-2018-2602

https://access.redhat.com/security/cve/cve-2018-2603

https://access.redhat.com/security/cve/cve-2018-2618

https://access.redhat.com/security/cve/cve-2018-2627

https://access.redhat.com/security/cve/cve-2018-2629

https://access.redhat.com/security/cve/cve-2018-2633

https://access.redhat.com/security/cve/cve-2018-2634

https://access.redhat.com/security/cve/cve-2018-2637

https://access.redhat.com/security/cve/cve-2018-2638

https://access.redhat.com/security/cve/cve-2018-2639

https://access.redhat.com/security/cve/cve-2018-2641

https://access.redhat.com/security/cve/cve-2018-2657

https://access.redhat.com/security/cve/cve-2018-2663

https://access.redhat.com/security/cve/cve-2018-2677

https://access.redhat.com/security/cve/cve-2018-2678

Plugin Details

Severity: Medium

ID: 109908

File Name: redhat-RHSA-2018-1463.nasl

Version: 1.5

Type: local

Agent: unix

Published: 5/18/2018

Updated: 10/24/2019

Dependencies: ssh_get_info.nasl

Risk Information

Risk Factor: Medium

VPR Score: 8.1

CVSS v2.0

Base Score: 6.8

Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS v3.0

Base Score: 8.3

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:java-1.8.0-ibm, p-cpe:/a:redhat:enterprise_linux:java-1.8.0-ibm-devel, cpe:/o:redhat:enterprise_linux:6

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Patch Publication Date: 5/15/2018

Vulnerability Publication Date: 1/18/2018

Reference Information

CVE: CVE-2018-1417, CVE-2018-2579, CVE-2018-2581, CVE-2018-2582, CVE-2018-2588, CVE-2018-2599, CVE-2018-2602, CVE-2018-2603, CVE-2018-2618, CVE-2018-2627, CVE-2018-2629, CVE-2018-2633, CVE-2018-2634, CVE-2018-2637, CVE-2018-2638, CVE-2018-2639, CVE-2018-2641, CVE-2018-2657, CVE-2018-2663, CVE-2018-2677, CVE-2018-2678

RHSA: 2018:1463