First published: Mon Dec 09 2019(Updated: )
IBM Java SE version 8 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit.<br>This update upgrades IBM Java SE 8 to version 8 SR6.<br>Security Fix(es):<br><li> OpenJDK: Unexpected exception thrown during regular expression processing in Nashorn (Scripting, 8223518) (CVE-2019-2975)</li> <li> OpenJDK: Incorrect handling of nested jar: URLs in Jar URL handler (Networking, 8223892) (CVE-2019-2978)</li> <li> OpenJDK: Incorrect handling of HTTP proxy responses in HttpURLConnection (Networking, 8225298) (CVE-2019-2989)</li> <li> Oracle JDK: unspecified vulnerability fixed in 8u221 (Deployment) (CVE-2019-2996)</li> <li> IBM JDK: Unrestricted access to diagnostic operations (CVE-2019-17631)</li> <li> OpenJDK: Missing restrictions on use of custom SocketImpl (Networking, 8218573) (CVE-2019-2945)</li> <li> OpenJDK: NULL pointer dereference in DrawGlyphList (2D, 8222690) (CVE-2019-2962)</li> <li> OpenJDK: Unexpected exception thrown by Pattern processing crafted regular expression (Concurrency, 8222684) (CVE-2019-2964)</li> <li> OpenJDK: Unexpected exception thrown by XPathParser processing crafted XPath expression (JAXP, 8223505) (CVE-2019-2973)</li> <li> OpenJDK: Unexpected exception thrown by XPath processing crafted XPath expression (JAXP, 8224532) (CVE-2019-2981)</li> <li> OpenJDK: Unexpected exception thrown during Font object deserialization (Serialization, 8224915) (CVE-2019-2983)</li> <li> OpenJDK: Integer overflow in bounds check in SunGraphics2D (2D, 8225292) (CVE-2019-2988)</li> <li> OpenJDK: Excessive memory allocation in CMap when reading TrueType font (2D, 8225597) (CVE-2019-2992)</li> <li> OpenJDK: Insufficient filtering of HTML event attributes in Javadoc (Javadoc, 8226765) (CVE-2019-2999)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/java | <1.8.0-ibm-1.8.0.6.0-1jpp.1.el7 | 1.8.0-ibm-1.8.0.6.0-1jpp.1.el7 |
redhat/java | <1.8.0-ibm-demo-1.8.0.6.0-1jpp.1.el7 | 1.8.0-ibm-demo-1.8.0.6.0-1jpp.1.el7 |
redhat/java | <1.8.0-ibm-devel-1.8.0.6.0-1jpp.1.el7 | 1.8.0-ibm-devel-1.8.0.6.0-1jpp.1.el7 |
redhat/java | <1.8.0-ibm-jdbc-1.8.0.6.0-1jpp.1.el7 | 1.8.0-ibm-jdbc-1.8.0.6.0-1jpp.1.el7 |
redhat/java | <1.8.0-ibm-plugin-1.8.0.6.0-1jpp.1.el7 | 1.8.0-ibm-plugin-1.8.0.6.0-1jpp.1.el7 |
redhat/java | <1.8.0-ibm-src-1.8.0.6.0-1jpp.1.el7 | 1.8.0-ibm-src-1.8.0.6.0-1jpp.1.el7 |
redhat/java | <1.8.0-ibm-1.8.0.6.0-1jpp.1.el7 | 1.8.0-ibm-1.8.0.6.0-1jpp.1.el7 |
redhat/java | <1.8.0-ibm-demo-1.8.0.6.0-1jpp.1.el7 | 1.8.0-ibm-demo-1.8.0.6.0-1jpp.1.el7 |
redhat/java | <1.8.0-ibm-devel-1.8.0.6.0-1jpp.1.el7 | 1.8.0-ibm-devel-1.8.0.6.0-1jpp.1.el7 |
redhat/java | <1.8.0-ibm-jdbc-1.8.0.6.0-1jpp.1.el7 | 1.8.0-ibm-jdbc-1.8.0.6.0-1jpp.1.el7 |
redhat/java | <1.8.0-ibm-src-1.8.0.6.0-1jpp.1.el7 | 1.8.0-ibm-src-1.8.0.6.0-1jpp.1.el7 |
redhat/java | <1.8.0-ibm-plugin-1.8.0.6.0-1jpp.1.el7 | 1.8.0-ibm-plugin-1.8.0.6.0-1jpp.1.el7 |
redhat/java | <1.8.0-ibm-1.8.0.6.0-1jpp.1.el7 | 1.8.0-ibm-1.8.0.6.0-1jpp.1.el7 |
redhat/java | <1.8.0-ibm-demo-1.8.0.6.0-1jpp.1.el7 | 1.8.0-ibm-demo-1.8.0.6.0-1jpp.1.el7 |
redhat/java | <1.8.0-ibm-devel-1.8.0.6.0-1jpp.1.el7 | 1.8.0-ibm-devel-1.8.0.6.0-1jpp.1.el7 |
redhat/java | <1.8.0-ibm-jdbc-1.8.0.6.0-1jpp.1.el7 | 1.8.0-ibm-jdbc-1.8.0.6.0-1jpp.1.el7 |
redhat/java | <1.8.0-ibm-src-1.8.0.6.0-1jpp.1.el7 | 1.8.0-ibm-src-1.8.0.6.0-1jpp.1.el7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.