-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================                   Red Hat Security Advisory

Synopsis:          Moderate: java-11-openjdk security update
Advisory ID:       RHSA-2019:1518-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://access.redhat.com/errata/RHSA-2019:1518
Issue date:        2019-06-18
CVE Names:         CVE-2019-2602 CVE-2019-2684 
====================================================================
1. Summary:

An update for java-11-openjdk is now available for Red Hat Enterprise Linux
8.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AppStream (v. 8) - aarch64, ppc64le, s390x, x86_64

3. Description:

The java-11-openjdk packages provide the OpenJDK 11 Java Runtime
Environment and the OpenJDK 11 Java Software Development Kit.

Security Fix(es):

* OpenJDK: Slow conversion of BigDecimal to long (Libraries, 8211936)
(CVE-2019-2602)

* OpenJDK: Incorrect skeleton selection in RMI registry server-side
dispatch handling (RMI, 8218453) (CVE-2019-2684)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

All running instances of OpenJDK Java must be restarted for this update to
take effect.

5. Bugs fixed (https://bugzilla.redhat.com/):

1700440 - CVE-2019-2602 OpenJDK: Slow conversion of BigDecimal to long (Libraries, 8211936)
1700564 - CVE-2019-2684 OpenJDK: Incorrect skeleton selection in RMI registry server-side dispatch handling (RMI, 8218453)

6. Package List:

Red Hat Enterprise Linux AppStream (v. 8):

Source:
java-11-openjdk-11.0.3.7-2.el8_0.src.rpm

aarch64:
java-11-openjdk-11.0.3.7-2.el8_0.aarch64.rpm
java-11-openjdk-debuginfo-11.0.3.7-2.el8_0.aarch64.rpm
java-11-openjdk-debugsource-11.0.3.7-2.el8_0.aarch64.rpm
java-11-openjdk-demo-11.0.3.7-2.el8_0.aarch64.rpm
java-11-openjdk-devel-11.0.3.7-2.el8_0.aarch64.rpm
java-11-openjdk-devel-debuginfo-11.0.3.7-2.el8_0.aarch64.rpm
java-11-openjdk-devel-slowdebug-debuginfo-11.0.3.7-2.el8_0.aarch64.rpm
java-11-openjdk-headless-11.0.3.7-2.el8_0.aarch64.rpm
java-11-openjdk-headless-debuginfo-11.0.3.7-2.el8_0.aarch64.rpm
java-11-openjdk-headless-slowdebug-debuginfo-11.0.3.7-2.el8_0.aarch64.rpm
java-11-openjdk-javadoc-11.0.3.7-2.el8_0.aarch64.rpm
java-11-openjdk-javadoc-zip-11.0.3.7-2.el8_0.aarch64.rpm
java-11-openjdk-jmods-11.0.3.7-2.el8_0.aarch64.rpm
java-11-openjdk-slowdebug-debuginfo-11.0.3.7-2.el8_0.aarch64.rpm
java-11-openjdk-src-11.0.3.7-2.el8_0.aarch64.rpm

ppc64le:
java-11-openjdk-11.0.3.7-2.el8_0.ppc64le.rpm
java-11-openjdk-debuginfo-11.0.3.7-2.el8_0.ppc64le.rpm
java-11-openjdk-debugsource-11.0.3.7-2.el8_0.ppc64le.rpm
java-11-openjdk-demo-11.0.3.7-2.el8_0.ppc64le.rpm
java-11-openjdk-devel-11.0.3.7-2.el8_0.ppc64le.rpm
java-11-openjdk-devel-debuginfo-11.0.3.7-2.el8_0.ppc64le.rpm
java-11-openjdk-devel-slowdebug-debuginfo-11.0.3.7-2.el8_0.ppc64le.rpm
java-11-openjdk-headless-11.0.3.7-2.el8_0.ppc64le.rpm
java-11-openjdk-headless-debuginfo-11.0.3.7-2.el8_0.ppc64le.rpm
java-11-openjdk-headless-slowdebug-debuginfo-11.0.3.7-2.el8_0.ppc64le.rpm
java-11-openjdk-javadoc-11.0.3.7-2.el8_0.ppc64le.rpm
java-11-openjdk-javadoc-zip-11.0.3.7-2.el8_0.ppc64le.rpm
java-11-openjdk-jmods-11.0.3.7-2.el8_0.ppc64le.rpm
java-11-openjdk-slowdebug-debuginfo-11.0.3.7-2.el8_0.ppc64le.rpm
java-11-openjdk-src-11.0.3.7-2.el8_0.ppc64le.rpm

s390x:
java-11-openjdk-11.0.3.7-2.el8_0.s390x.rpm
java-11-openjdk-debuginfo-11.0.3.7-2.el8_0.s390x.rpm
java-11-openjdk-debugsource-11.0.3.7-2.el8_0.s390x.rpm
java-11-openjdk-demo-11.0.3.7-2.el8_0.s390x.rpm
java-11-openjdk-devel-11.0.3.7-2.el8_0.s390x.rpm
java-11-openjdk-devel-debuginfo-11.0.3.7-2.el8_0.s390x.rpm
java-11-openjdk-devel-slowdebug-debuginfo-11.0.3.7-2.el8_0.s390x.rpm
java-11-openjdk-headless-11.0.3.7-2.el8_0.s390x.rpm
java-11-openjdk-headless-debuginfo-11.0.3.7-2.el8_0.s390x.rpm
java-11-openjdk-headless-slowdebug-debuginfo-11.0.3.7-2.el8_0.s390x.rpm
java-11-openjdk-javadoc-11.0.3.7-2.el8_0.s390x.rpm
java-11-openjdk-javadoc-zip-11.0.3.7-2.el8_0.s390x.rpm
java-11-openjdk-jmods-11.0.3.7-2.el8_0.s390x.rpm
java-11-openjdk-slowdebug-debuginfo-11.0.3.7-2.el8_0.s390x.rpm
java-11-openjdk-src-11.0.3.7-2.el8_0.s390x.rpm

x86_64:
java-11-openjdk-11.0.3.7-2.el8_0.x86_64.rpm
java-11-openjdk-debuginfo-11.0.3.7-2.el8_0.x86_64.rpm
java-11-openjdk-debugsource-11.0.3.7-2.el8_0.x86_64.rpm
java-11-openjdk-demo-11.0.3.7-2.el8_0.x86_64.rpm
java-11-openjdk-devel-11.0.3.7-2.el8_0.x86_64.rpm
java-11-openjdk-devel-debuginfo-11.0.3.7-2.el8_0.x86_64.rpm
java-11-openjdk-devel-slowdebug-debuginfo-11.0.3.7-2.el8_0.x86_64.rpm
java-11-openjdk-headless-11.0.3.7-2.el8_0.x86_64.rpm
java-11-openjdk-headless-debuginfo-11.0.3.7-2.el8_0.x86_64.rpm
java-11-openjdk-headless-slowdebug-debuginfo-11.0.3.7-2.el8_0.x86_64.rpm
java-11-openjdk-javadoc-11.0.3.7-2.el8_0.x86_64.rpm
java-11-openjdk-javadoc-zip-11.0.3.7-2.el8_0.x86_64.rpm
java-11-openjdk-jmods-11.0.3.7-2.el8_0.x86_64.rpm
java-11-openjdk-slowdebug-debuginfo-11.0.3.7-2.el8_0.x86_64.rpm
java-11-openjdk-src-11.0.3.7-2.el8_0.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2019-2602
https://access.redhat.com/security/cve/CVE-2019-2684
https://access.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2019 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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1IlR
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2019-1518:01 Moderate: java-11-openjdk security update

An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8

Summary

The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
Security Fix(es):
* OpenJDK: Slow conversion of BigDecimal to long (Libraries, 8211936) (CVE-2019-2602)
* OpenJDK: Incorrect skeleton selection in RMI registry server-side dispatch handling (RMI, 8218453) (CVE-2019-2684)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.



Summary


Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
All running instances of OpenJDK Java must be restarted for this update to take effect.

References

https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684 https://access.redhat.com/security/updates/classification/#moderate

Package List

Red Hat Enterprise Linux AppStream (v. 8):
Source: java-11-openjdk-11.0.3.7-2.el8_0.src.rpm
aarch64: java-11-openjdk-11.0.3.7-2.el8_0.aarch64.rpm java-11-openjdk-debuginfo-11.0.3.7-2.el8_0.aarch64.rpm java-11-openjdk-debugsource-11.0.3.7-2.el8_0.aarch64.rpm java-11-openjdk-demo-11.0.3.7-2.el8_0.aarch64.rpm java-11-openjdk-devel-11.0.3.7-2.el8_0.aarch64.rpm java-11-openjdk-devel-debuginfo-11.0.3.7-2.el8_0.aarch64.rpm java-11-openjdk-devel-slowdebug-debuginfo-11.0.3.7-2.el8_0.aarch64.rpm java-11-openjdk-headless-11.0.3.7-2.el8_0.aarch64.rpm java-11-openjdk-headless-debuginfo-11.0.3.7-2.el8_0.aarch64.rpm java-11-openjdk-headless-slowdebug-debuginfo-11.0.3.7-2.el8_0.aarch64.rpm java-11-openjdk-javadoc-11.0.3.7-2.el8_0.aarch64.rpm java-11-openjdk-javadoc-zip-11.0.3.7-2.el8_0.aarch64.rpm java-11-openjdk-jmods-11.0.3.7-2.el8_0.aarch64.rpm java-11-openjdk-slowdebug-debuginfo-11.0.3.7-2.el8_0.aarch64.rpm java-11-openjdk-src-11.0.3.7-2.el8_0.aarch64.rpm
ppc64le: java-11-openjdk-11.0.3.7-2.el8_0.ppc64le.rpm java-11-openjdk-debuginfo-11.0.3.7-2.el8_0.ppc64le.rpm java-11-openjdk-debugsource-11.0.3.7-2.el8_0.ppc64le.rpm java-11-openjdk-demo-11.0.3.7-2.el8_0.ppc64le.rpm java-11-openjdk-devel-11.0.3.7-2.el8_0.ppc64le.rpm java-11-openjdk-devel-debuginfo-11.0.3.7-2.el8_0.ppc64le.rpm java-11-openjdk-devel-slowdebug-debuginfo-11.0.3.7-2.el8_0.ppc64le.rpm java-11-openjdk-headless-11.0.3.7-2.el8_0.ppc64le.rpm java-11-openjdk-headless-debuginfo-11.0.3.7-2.el8_0.ppc64le.rpm java-11-openjdk-headless-slowdebug-debuginfo-11.0.3.7-2.el8_0.ppc64le.rpm java-11-openjdk-javadoc-11.0.3.7-2.el8_0.ppc64le.rpm java-11-openjdk-javadoc-zip-11.0.3.7-2.el8_0.ppc64le.rpm java-11-openjdk-jmods-11.0.3.7-2.el8_0.ppc64le.rpm java-11-openjdk-slowdebug-debuginfo-11.0.3.7-2.el8_0.ppc64le.rpm java-11-openjdk-src-11.0.3.7-2.el8_0.ppc64le.rpm
s390x: java-11-openjdk-11.0.3.7-2.el8_0.s390x.rpm java-11-openjdk-debuginfo-11.0.3.7-2.el8_0.s390x.rpm java-11-openjdk-debugsource-11.0.3.7-2.el8_0.s390x.rpm java-11-openjdk-demo-11.0.3.7-2.el8_0.s390x.rpm java-11-openjdk-devel-11.0.3.7-2.el8_0.s390x.rpm java-11-openjdk-devel-debuginfo-11.0.3.7-2.el8_0.s390x.rpm java-11-openjdk-devel-slowdebug-debuginfo-11.0.3.7-2.el8_0.s390x.rpm java-11-openjdk-headless-11.0.3.7-2.el8_0.s390x.rpm java-11-openjdk-headless-debuginfo-11.0.3.7-2.el8_0.s390x.rpm java-11-openjdk-headless-slowdebug-debuginfo-11.0.3.7-2.el8_0.s390x.rpm java-11-openjdk-javadoc-11.0.3.7-2.el8_0.s390x.rpm java-11-openjdk-javadoc-zip-11.0.3.7-2.el8_0.s390x.rpm java-11-openjdk-jmods-11.0.3.7-2.el8_0.s390x.rpm java-11-openjdk-slowdebug-debuginfo-11.0.3.7-2.el8_0.s390x.rpm java-11-openjdk-src-11.0.3.7-2.el8_0.s390x.rpm
x86_64: java-11-openjdk-11.0.3.7-2.el8_0.x86_64.rpm java-11-openjdk-debuginfo-11.0.3.7-2.el8_0.x86_64.rpm java-11-openjdk-debugsource-11.0.3.7-2.el8_0.x86_64.rpm java-11-openjdk-demo-11.0.3.7-2.el8_0.x86_64.rpm java-11-openjdk-devel-11.0.3.7-2.el8_0.x86_64.rpm java-11-openjdk-devel-debuginfo-11.0.3.7-2.el8_0.x86_64.rpm java-11-openjdk-devel-slowdebug-debuginfo-11.0.3.7-2.el8_0.x86_64.rpm java-11-openjdk-headless-11.0.3.7-2.el8_0.x86_64.rpm java-11-openjdk-headless-debuginfo-11.0.3.7-2.el8_0.x86_64.rpm java-11-openjdk-headless-slowdebug-debuginfo-11.0.3.7-2.el8_0.x86_64.rpm java-11-openjdk-javadoc-11.0.3.7-2.el8_0.x86_64.rpm java-11-openjdk-javadoc-zip-11.0.3.7-2.el8_0.x86_64.rpm java-11-openjdk-jmods-11.0.3.7-2.el8_0.x86_64.rpm java-11-openjdk-slowdebug-debuginfo-11.0.3.7-2.el8_0.x86_64.rpm java-11-openjdk-src-11.0.3.7-2.el8_0.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/


Severity
Advisory ID: RHSA-2019:1518-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2019:1518
Issued Date: : 2019-06-18
CVE Names: CVE-2019-2602 CVE-2019-2684

Topic

An update for java-11-openjdk is now available for Red Hat Enterprise Linux8.Red Hat Product Security has rated this update as having a security impactof Moderate. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available for each vulnerability fromthe CVE link(s) in the References section.


Topic


 

Relevant Releases Architectures

Red Hat Enterprise Linux AppStream (v. 8) - aarch64, ppc64le, s390x, x86_64


Bugs Fixed

1700440 - CVE-2019-2602 OpenJDK: Slow conversion of BigDecimal to long (Libraries, 8211936)

1700564 - CVE-2019-2684 OpenJDK: Incorrect skeleton selection in RMI registry server-side dispatch handling (RMI, 8218453)


Related News