Synopsis:          Important: java-1.8.0-openjdk security update
Advisory ID:       SLSA-2018:1649-1
Issue Date:        2018-05-22
CVE Numbers:       CVE-2018-3639
--

Security Fix(es):

* An industry-wide issue was found in the way many modern microprocessor
designs have implemented speculative execution of Load & Store
instructions (a commonly used performance optimization). It relies on the
presence of a precisely-defined instruction sequence in the privileged
code as well as the fact that memory read from address to which a recent
memory write has occurred may see an older value and subsequently cause an
update into the microprocessor's data cache even for speculatively
executed instructions that never actually commit (retire). As a result, an
unprivileged attacker could use this flaw to read privileged memory by
conducting targeted cache side-channel attacks. (CVE-2018-3639)

Note: This is the OpenJDK side of the CVE-2018-3639 mitigation.
--

SL7
  x86_64
    java-1.8.0-openjdk-1.8.0.171-8.b10.el7_5.i686.rpm
    java-1.8.0-openjdk-1.8.0.171-8.b10.el7_5.x86_64.rpm
    java-1.8.0-openjdk-debuginfo-1.8.0.171-8.b10.el7_5.i686.rpm
    java-1.8.0-openjdk-debuginfo-1.8.0.171-8.b10.el7_5.x86_64.rpm
    java-1.8.0-openjdk-headless-1.8.0.171-8.b10.el7_5.i686.rpm
    java-1.8.0-openjdk-headless-1.8.0.171-8.b10.el7_5.x86_64.rpm
    java-1.8.0-openjdk-accessibility-1.8.0.171-8.b10.el7_5.i686.rpm
    java-1.8.0-openjdk-accessibility-1.8.0.171-8.b10.el7_5.x86_64.rpm
    java-1.8.0-openjdk-accessibility-debug-1.8.0.171-8.b10.el7_5.i686.rpm
    java-1.8.0-openjdk-accessibility-debug-1.8.0.171-8.b10.el7_5.x86_64.rpm
    java-1.8.0-openjdk-debug-1.8.0.171-8.b10.el7_5.i686.rpm
    java-1.8.0-openjdk-debug-1.8.0.171-8.b10.el7_5.x86_64.rpm
    java-1.8.0-openjdk-demo-1.8.0.171-8.b10.el7_5.i686.rpm
    java-1.8.0-openjdk-demo-1.8.0.171-8.b10.el7_5.x86_64.rpm
    java-1.8.0-openjdk-demo-debug-1.8.0.171-8.b10.el7_5.i686.rpm
    java-1.8.0-openjdk-demo-debug-1.8.0.171-8.b10.el7_5.x86_64.rpm
    java-1.8.0-openjdk-devel-1.8.0.171-8.b10.el7_5.i686.rpm
    java-1.8.0-openjdk-devel-1.8.0.171-8.b10.el7_5.x86_64.rpm
    java-1.8.0-openjdk-devel-debug-1.8.0.171-8.b10.el7_5.i686.rpm
    java-1.8.0-openjdk-devel-debug-1.8.0.171-8.b10.el7_5.x86_64.rpm
    java-1.8.0-openjdk-headless-debug-1.8.0.171-8.b10.el7_5.i686.rpm
    java-1.8.0-openjdk-headless-debug-1.8.0.171-8.b10.el7_5.x86_64.rpm
    java-1.8.0-openjdk-src-1.8.0.171-8.b10.el7_5.i686.rpm
    java-1.8.0-openjdk-src-1.8.0.171-8.b10.el7_5.x86_64.rpm
    java-1.8.0-openjdk-src-debug-1.8.0.171-8.b10.el7_5.i686.rpm
    java-1.8.0-openjdk-src-debug-1.8.0.171-8.b10.el7_5.x86_64.rpm
  noarch
    java-1.8.0-openjdk-javadoc-1.8.0.171-8.b10.el7_5.noarch.rpm
    java-1.8.0-openjdk-javadoc-debug-1.8.0.171-8.b10.el7_5.noarch.rpm
    java-1.8.0-openjdk-javadoc-zip-1.8.0.171-8.b10.el7_5.noarch.rpm
    java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.171-8.b10.el7_5.noarch.rpm

- Scientific Linux Development Team

SciLinux: SLSA-2018-1649-1 Important: java-1.8.0-openjdk on SL7.x x86_64

An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load & Store instructions (a commonly used performance opti...

Summary

Important: java-1.8.0-openjdk security update



Security Fixes

* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load & Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)
Note: This is the OpenJDK side of the CVE-2018-3639 mitigation.
SL7 x86_64 java-1.8.0-openjdk-1.8.0.171-8.b10.el7_5.i686.rpm java-1.8.0-openjdk-1.8.0.171-8.b10.el7_5.x86_64.rpm java-1.8.0-openjdk-debuginfo-1.8.0.171-8.b10.el7_5.i686.rpm java-1.8.0-openjdk-debuginfo-1.8.0.171-8.b10.el7_5.x86_64.rpm java-1.8.0-openjdk-headless-1.8.0.171-8.b10.el7_5.i686.rpm java-1.8.0-openjdk-headless-1.8.0.171-8.b10.el7_5.x86_64.rpm java-1.8.0-openjdk-accessibility-1.8.0.171-8.b10.el7_5.i686.rpm java-1.8.0-openjdk-accessibility-1.8.0.171-8.b10.el7_5.x86_64.rpm java-1.8.0-openjdk-accessibility-debug-1.8.0.171-8.b10.el7_5.i686.rpm java-1.8.0-openjdk-accessibility-debug-1.8.0.171-8.b10.el7_5.x86_64.rpm java-1.8.0-openjdk-debug-1.8.0.171-8.b10.el7_5.i686.rpm java-1.8.0-openjdk-debug-1.8.0.171-8.b10.el7_5.x86_64.rpm java-1.8.0-openjdk-demo-1.8.0.171-8.b10.el7_5.i686.rpm java-1.8.0-openjdk-demo-1.8.0.171-8.b10.el7_5.x86_64.rpm java-1.8.0-openjdk-demo-debug-1.8.0.171-8.b10.el7_5.i686.rpm java-1.8.0-openjdk-demo-debug-1.8.0.171-8.b10.el7_5.x86_64.rpm java-1.8.0-openjdk-devel-1.8.0.171-8.b10.el7_5.i686.rpm java-1.8.0-openjdk-devel-1.8.0.171-8.b10.el7_5.x86_64.rpm java-1.8.0-openjdk-devel-debug-1.8.0.171-8.b10.el7_5.i686.rpm java-1.8.0-openjdk-devel-debug-1.8.0.171-8.b10.el7_5.x86_64.rpm java-1.8.0-openjdk-headless-debug-1.8.0.171-8.b10.el7_5.i686.rpm java-1.8.0-openjdk-headless-debug-1.8.0.171-8.b10.el7_5.x86_64.rpm java-1.8.0-openjdk-src-1.8.0.171-8.b10.el7_5.i686.rpm java-1.8.0-openjdk-src-1.8.0.171-8.b10.el7_5.x86_64.rpm java-1.8.0-openjdk-src-debug-1.8.0.171-8.b10.el7_5.i686.rpm java-1.8.0-openjdk-src-debug-1.8.0.171-8.b10.el7_5.x86_64.rpm noarch java-1.8.0-openjdk-javadoc-1.8.0.171-8.b10.el7_5.noarch.rpm java-1.8.0-openjdk-javadoc-debug-1.8.0.171-8.b10.el7_5.noarch.rpm java-1.8.0-openjdk-javadoc-zip-1.8.0.171-8.b10.el7_5.noarch.rpm java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.171-8.b10.el7_5.noarch.rpm
- Scientific Linux Development Team

Severity
Advisory ID: SLSA-2018:1649-1
Issued Date: : 2018-05-22
CVE Numbers: CVE-2018-3639