Oracle Linux 7 : java-1.8.0-openjdk (ELSA-2020-2968)

high Nessus Plugin ID 138663

Synopsis

The remote Oracle Linux host is missing one or more security updates.

Description

The remote Oracle Linux 7 host has packages installed that are affected by multiple vulnerabilities as referenced in the ELSA-2020-2968 advisory.

[1:1.8.0.262.b10-0]
- Update to aarch64-shenandoah-jdk8u262-b10.
- Switch to GA mode for final release.
- Update release notes for 8u262 release.
- Fix typo in jfr_arches which leads to ppc64 being wrongly excluded.
- Split JDK-8042159 patch into per-repo patches as upstream.
- Update JDK-8042159 JDK patch to apply after JDK-8238002 changes to Awt2dLibraries.gmk
- Resolves: rhbz#1838811

[1:1.8.0.262.b09-0.1.ea]
- Update to aarch64-shenandoah-jdk8u262-b09-shenandoah-merge-2020-07-03
- Resolves: rhbz#1838811

[1:1.8.0.262.b09-0.0.ea]
- Update to aarch64-shenandoah-jdk8u262-b09.
- With JDK-8248399 fixed, a broken jfr binary is no longer installed on architectures without JFR.
- Resolves: rhbz#1838811

[1:1.8.0.262.b08-0.0.ea]
- Update to aarch64-shenandoah-jdk8u262-b08.
- Resolves: rhbz#1838811

[1:1.8.0.262.b07-0.2.ea]
- Update to aarch64-shenandoah-jdk8u262-b07-shenandoah-merge-2020-06-18.
- Resolves: rhbz#1838811

[1:1.8.0.262.b07-0.1.ea]
- Sync alt-java support with java-11-openjdk version.
- Resolves: rhbz#1838811

[1:1.8.0.262.b07-0.1.ea]
- Created copy of java as alt-java and adapted alternatives and man pages
- Resolves: rhbz#1838811

[1:1.8.0.262.b07-0.0.ea]
- Update to aarch64-shenandoah-jdk8u262-b07.
- Require tzdata 2020a so system tzdata matches resource updates in b07
- Resolves: rhbz#1838811

[1:1.8.0.262.b06-0.1.ea]
- Sync SystemTap & desktop files with upstream IcedTea release 3.15.0, removing previous workarounds
- Sync stapinstall handling with RHEL 8 implementation
- Need to support noarch for creating source RPMs for non-scratch builds.
- Resolves: rhbz#1838811

[1:1.8.0.262.b06-0.0.ea]
- Update to aarch64-shenandoah-jdk8u262-b06.
- Resolves: rhbz#1838811

[1:1.8.0.262.b05-0.1.ea]
- Update to aarch64-shenandoah-jdk8u262-b05-shenandoah-merge-2020-06-04.
- Resolves: rhbz#1838811

[1:1.8.0.262.b05-0.0.ea]
- Update to aarch64-shenandoah-jdk8u262-b05.
- Resolves: rhbz#1838811

[1:1.8.0.262.b04-0.0.ea]
- Update to aarch64-shenandoah-jdk8u262-b04.
- Resolves: rhbz#1838811

[1:1.8.0.262.b03-0.1.ea]
- Update to aarch64-shenandoah-jdk8u262-b03-shenandoah-merge-2020-05-20.
- Resolves: rhbz#1838811

[1:1.8.0.262.b03-0.0.ea]
- Update to aarch64-shenandoah-jdk8u262-b03.
- Resolves: rhbz#1838811

[1:1.8.0.262.b02-0.1.ea]
- Enable JFR in our builds, ahead of upstream default.
- Only enable JFR for JIT builds, as it is not supported with Zero.
- Turn off JFR on x86 for now due to assert(SerializePageShiftCount == count) crash.
- Introduce jfr_arches for architectures which support JFR.
- Resolves: rhbz#1838811

[1:1.8.0.262.b02-0.0.ea]
- Update to aarch64-shenandoah-jdk8u262-b02.
- Resolves: rhbz#1838811

[1:1.8.0.262.b01-0.0.ea]
- Update to aarch64-shenandoah-jdk8u262-b01.
- Switch to EA mode.
- Adjust JDK-8143245/PR3548 patch following context changes due to JDK-8203287 for JFR
- Adjust RH1648644 following context changes due to introduction of JFR packages
- Add recently added binaries to alternatives set (clhsdb, hsdb, jfr)
- Resolves: rhbz#1838811

Tenable has extracted the preceding description block directly from the Oracle Linux security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://linux.oracle.com/errata/ELSA-2020-2968.html

Plugin Details

Severity: High

ID: 138663

File Name: oraclelinux_ELSA-2020-2968.nasl

Version: 1.6

Type: local

Agent: unix

Published: 7/20/2020

Updated: 11/1/2024

Supported Sensors: Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.5

CVSS v2

Risk Factor: Medium

Base Score: 5.8

Temporal Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N

CVSS Score Source: CVE-2020-14556

CVSS v3

Risk Factor: High

Base Score: 8.3

Temporal Score: 7.2

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

CVSS Score Source: CVE-2020-14583

Vulnerability Information

CPE: p-cpe:/a:oracle:linux:java-1.8.0-openjdk, p-cpe:/a:oracle:linux:java-1.8.0-openjdk-src, p-cpe:/a:oracle:linux:java-1.8.0-openjdk-accessibility, p-cpe:/a:oracle:linux:java-1.8.0-openjdk-demo, p-cpe:/a:oracle:linux:java-1.8.0-openjdk-headless, p-cpe:/a:oracle:linux:java-1.8.0-openjdk-javadoc-zip, cpe:/o:oracle:linux:7, p-cpe:/a:oracle:linux:java-1.8.0-openjdk-devel, p-cpe:/a:oracle:linux:java-1.8.0-openjdk-javadoc

Required KB Items: Host/local_checks_enabled, Host/OracleLinux, Host/RedHat/release, Host/RedHat/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 7/17/2020

Vulnerability Publication Date: 7/15/2020

Reference Information

CVE: CVE-2020-14556, CVE-2020-14577, CVE-2020-14578, CVE-2020-14579, CVE-2020-14583, CVE-2020-14593, CVE-2020-14621

RHSA: 2020:2968