[RHSA-2019:2592] java-1.8.0-ibm security update
IBM Java SE version 8 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit.
This update upgrades IBM Java SE 8 to version 8 SR5-FP40.
Security Fix(es):
IBM JDK: Out-of-bounds access in the String.getBytes method (CVE-2019-11772)
IBM JDK: Failure to privatize a value pulled out of the loop by versioning (CVE-2019-11775)
OpenJDK: Insufficient checks of suppressed exceptions in deserialization (Utilities, 8212328) (CVE-2019-2762)
OpenJDK: Unbounded memory allocation during deserialization in Collections (Utilities, 8213432) (CVE-2019-2769)
OpenJDK: Missing URL format validation (Networking, 8221518) (CVE-2019-2816)
OpenJDK: Insufficient restriction of privileges in AccessController (Security, 8216381) (CVE-2019-2786)
libpng: use-after-free in png_image_free in png.c (CVE-2019-7317)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
- ID
- RHSA-2019:2592
- Severity
- important
- URL
- https://access.redhat.com/errata/RHSA-2019:2592
- Published
-
2019-09-03T00:00:00
(5 years ago) - Modified
-
2019-09-03T00:00:00
(5 years ago) - Rights
- Copyright 2019 Red Hat, Inc.
- Other Advisories
-
- ALAS-2019-1268
- ALAS-2019-1269
- ALAS2-2019-1229
- ALAS2-2019-1246
- ALAS2-2019-1268
- ALAS2-2019-1269
- ALPINE:CVE-2019-2762
- ALPINE:CVE-2019-2769
- ALPINE:CVE-2019-2786
- ALPINE:CVE-2019-2816
- ALPINE:CVE-2019-7317
- ASA-201904-10
- ASA-201905-8
- ASA-201905-9
- DSA-4435-1
- DSA-4448-1
- DSA-4451-1
- DSA-4485-1
- DSA-4486-1
- ELSA-2019-1265
- ELSA-2019-1267
- ELSA-2019-1269
- ELSA-2019-1308
- ELSA-2019-1309
- ELSA-2019-1310
- ELSA-2019-1810
- ELSA-2019-1811
- ELSA-2019-1815
- ELSA-2019-1816
- ELSA-2019-1817
- ELSA-2019-1839
- ELSA-2019-1840
- FEDORA-2019-335c3ad86a
- FREEBSD:44B6DFBF-4EF7-4D52-AD52-2B1B05D81272
- GLSA-201908-02
- MFSA-2019-13
- MFSA-2019-14
- MFSA-2019-15
- openSUSE-SU-2019:1530-1
- openSUSE-SU-2019:1534-1
- openSUSE-SU-2019:1664-1
- openSUSE-SU-2019:1912-1
- openSUSE-SU-2019:1916-1
- RHSA-2019:1265
- RHSA-2019:1267
- RHSA-2019:1269
- RHSA-2019:1308
- RHSA-2019:1309
- RHSA-2019:1310
- RHSA-2019:1810
- RHSA-2019:1811
- RHSA-2019:1815
- RHSA-2019:1816
- RHSA-2019:1817
- RHSA-2019:1839
- RHSA-2019:1840
- RHSA-2019:2494
- RHSA-2019:2495
- RHSA-2019:2585
- RHSA-2019:2590
- SSA:2019-107-01
- SSA:2019-141-01
- SUSE-SU-2019:1388-1
- SUSE-SU-2019:1398-1
- SUSE-SU-2019:1398-2
- SUSE-SU-2019:1405-1
- SUSE-SU-2019:1458-1
- SUSE-SU-2019:2002-1
- SUSE-SU-2019:2021-1
- SUSE-SU-2019:2028-1
- SUSE-SU-2019:2036-1
- SUSE-SU-2019:2036-2
- SUSE-SU-2019:2291-1
- SUSE-SU-2019:2336-1
- SUSE-SU-2019:2371-1
- SUSE-SU-2019:3060-2
- USN-3962-1
- USN-3991-1
- USN-3997-1
- USN-4080-1
- USN-4083-1
Source | # ID | Name | URL |
---|---|---|---|
Bugzilla | 1672409 | https://bugzilla.redhat.com/1672409 | |
Bugzilla | 1730056 | https://bugzilla.redhat.com/1730056 | |
Bugzilla | 1730099 | https://bugzilla.redhat.com/1730099 | |
Bugzilla | 1730255 | https://bugzilla.redhat.com/1730255 | |
Bugzilla | 1730415 | https://bugzilla.redhat.com/1730415 | |
Bugzilla | 1738547 | https://bugzilla.redhat.com/1738547 | |
Bugzilla | 1738549 | https://bugzilla.redhat.com/1738549 | |
RHSA | RHSA-2019:2592 | https://access.redhat.com/errata/RHSA-2019:2592 | |
CVE | CVE-2019-11772 | https://access.redhat.com/security/cve/CVE-2019-11772 | |
CVE | CVE-2019-11775 | https://access.redhat.com/security/cve/CVE-2019-11775 | |
CVE | CVE-2019-2762 | https://access.redhat.com/security/cve/CVE-2019-2762 | |
CVE | CVE-2019-2769 | https://access.redhat.com/security/cve/CVE-2019-2769 | |
CVE | CVE-2019-2786 | https://access.redhat.com/security/cve/CVE-2019-2786 | |
CVE | CVE-2019-2816 | https://access.redhat.com/security/cve/CVE-2019-2816 | |
CVE | CVE-2019-7317 | https://access.redhat.com/security/cve/CVE-2019-7317 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/java-1.8.0-ibm?arch=x86_64&distro=redhat-6.10 | redhat | java-1.8.0-ibm | < 1.8.0.5.40-1jpp.1.el6_10 | redhat-6.10 | x86_64 | |
Affected | pkg:rpm/redhat/java-1.8.0-ibm?arch=s390x&distro=redhat-6.10 | redhat | java-1.8.0-ibm | < 1.8.0.5.40-1jpp.1.el6_10 | redhat-6.10 | s390x | |
Affected | pkg:rpm/redhat/java-1.8.0-ibm?arch=ppc64&distro=redhat-6.10 | redhat | java-1.8.0-ibm | < 1.8.0.5.40-1jpp.1.el6_10 | redhat-6.10 | ppc64 | |
Affected | pkg:rpm/redhat/java-1.8.0-ibm?arch=i686&distro=redhat-6.10 | redhat | java-1.8.0-ibm | < 1.8.0.5.40-1jpp.1.el6_10 | redhat-6.10 | i686 | |
Affected | pkg:rpm/redhat/java-1.8.0-ibm-src?arch=x86_64&distro=redhat-6.10 | redhat | java-1.8.0-ibm-src | < 1.8.0.5.40-1jpp.1.el6_10 | redhat-6.10 | x86_64 | |
Affected | pkg:rpm/redhat/java-1.8.0-ibm-src?arch=s390x&distro=redhat-6.10 | redhat | java-1.8.0-ibm-src | < 1.8.0.5.40-1jpp.1.el6_10 | redhat-6.10 | s390x | |
Affected | pkg:rpm/redhat/java-1.8.0-ibm-src?arch=ppc64&distro=redhat-6.10 | redhat | java-1.8.0-ibm-src | < 1.8.0.5.40-1jpp.1.el6_10 | redhat-6.10 | ppc64 | |
Affected | pkg:rpm/redhat/java-1.8.0-ibm-src?arch=i686&distro=redhat-6.10 | redhat | java-1.8.0-ibm-src | < 1.8.0.5.40-1jpp.1.el6_10 | redhat-6.10 | i686 | |
Affected | pkg:rpm/redhat/java-1.8.0-ibm-plugin?arch=x86_64&distro=redhat-6.10 | redhat | java-1.8.0-ibm-plugin | < 1.8.0.5.40-1jpp.1.el6_10 | redhat-6.10 | x86_64 | |
Affected | pkg:rpm/redhat/java-1.8.0-ibm-plugin?arch=i686&distro=redhat-6.10 | redhat | java-1.8.0-ibm-plugin | < 1.8.0.5.40-1jpp.1.el6_10 | redhat-6.10 | i686 | |
Affected | pkg:rpm/redhat/java-1.8.0-ibm-jdbc?arch=x86_64&distro=redhat-6.10 | redhat | java-1.8.0-ibm-jdbc | < 1.8.0.5.40-1jpp.1.el6_10 | redhat-6.10 | x86_64 | |
Affected | pkg:rpm/redhat/java-1.8.0-ibm-jdbc?arch=s390x&distro=redhat-6.10 | redhat | java-1.8.0-ibm-jdbc | < 1.8.0.5.40-1jpp.1.el6_10 | redhat-6.10 | s390x | |
Affected | pkg:rpm/redhat/java-1.8.0-ibm-jdbc?arch=ppc64&distro=redhat-6.10 | redhat | java-1.8.0-ibm-jdbc | < 1.8.0.5.40-1jpp.1.el6_10 | redhat-6.10 | ppc64 | |
Affected | pkg:rpm/redhat/java-1.8.0-ibm-jdbc?arch=i686&distro=redhat-6.10 | redhat | java-1.8.0-ibm-jdbc | < 1.8.0.5.40-1jpp.1.el6_10 | redhat-6.10 | i686 | |
Affected | pkg:rpm/redhat/java-1.8.0-ibm-devel?arch=x86_64&distro=redhat-6.10 | redhat | java-1.8.0-ibm-devel | < 1.8.0.5.40-1jpp.1.el6_10 | redhat-6.10 | x86_64 | |
Affected | pkg:rpm/redhat/java-1.8.0-ibm-devel?arch=s390x&distro=redhat-6.10 | redhat | java-1.8.0-ibm-devel | < 1.8.0.5.40-1jpp.1.el6_10 | redhat-6.10 | s390x | |
Affected | pkg:rpm/redhat/java-1.8.0-ibm-devel?arch=ppc64&distro=redhat-6.10 | redhat | java-1.8.0-ibm-devel | < 1.8.0.5.40-1jpp.1.el6_10 | redhat-6.10 | ppc64 | |
Affected | pkg:rpm/redhat/java-1.8.0-ibm-devel?arch=i686&distro=redhat-6.10 | redhat | java-1.8.0-ibm-devel | < 1.8.0.5.40-1jpp.1.el6_10 | redhat-6.10 | i686 | |
Affected | pkg:rpm/redhat/java-1.8.0-ibm-demo?arch=x86_64&distro=redhat-6.10 | redhat | java-1.8.0-ibm-demo | < 1.8.0.5.40-1jpp.1.el6_10 | redhat-6.10 | x86_64 | |
Affected | pkg:rpm/redhat/java-1.8.0-ibm-demo?arch=s390x&distro=redhat-6.10 | redhat | java-1.8.0-ibm-demo | < 1.8.0.5.40-1jpp.1.el6_10 | redhat-6.10 | s390x | |
Affected | pkg:rpm/redhat/java-1.8.0-ibm-demo?arch=ppc64&distro=redhat-6.10 | redhat | java-1.8.0-ibm-demo | < 1.8.0.5.40-1jpp.1.el6_10 | redhat-6.10 | ppc64 | |
Affected | pkg:rpm/redhat/java-1.8.0-ibm-demo?arch=i686&distro=redhat-6.10 | redhat | java-1.8.0-ibm-demo | < 1.8.0.5.40-1jpp.1.el6_10 | redhat-6.10 | i686 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |