java-1.8.0-openjdk-1.8.0.51-1.b16.el7

エラータID: AXSA:2015-225:01

Release date: 
Saturday, July 25, 2015 - 16:59
Subject: 
java-1.8.0-openjdk-1.8.0.51-1.b16.el7
Affected Channels: 
Asianux Server 7 for x86_64
Severity: 
High
Description: 

The OpenJDK runtime environment.

Security issues fixed with this release:

CVE-2015-2590
** RESERVED **
This candidate has been reserved by an organization or individual that
will use it when announcing a new security problem. When the
candidate has been publicized, the details for this candidate will be
provided.
CVE-2015-2601
** RESERVED **
This candidate has been reserved by an organization or individual that
will use it when announcing a new security problem. When the
candidate has been publicized, the details for this candidate will be
provided.
CVE-2015-2621
** RESERVED **
This candidate has been reserved by an organization or individual that
will use it when announcing a new security problem. When the
candidate has been publicized, the details for this candidate will be
provided.
CVE-2015-2625
** RESERVED **
This candidate has been reserved by an organization or individual that
will use it when announcing a new security problem. When the
candidate has been publicized, the details for this candidate will be
provided.
CVE-2015-2628
** RESERVED **
This candidate has been reserved by an organization or individual that
will use it when announcing a new security problem. When the
candidate has been publicized, the details for this candidate will be
provided.
CVE-2015-2632
** RESERVED **
This candidate has been reserved by an organization or individual that
will use it when announcing a new security problem. When the
candidate has been publicized, the details for this candidate will be
provided.
CVE-2015-2659
** RESERVED **
This candidate has been reserved by an organization or individual that
will use it when announcing a new security problem. When the
candidate has been publicized, the details for this candidate will be
provided.
CVE-2015-2808
The RC4 algorithm, as used in the TLS protocol and SSL protocol, does
not properly combine state data with key data during the
initialization phase, which makes it easier for remote attackers to
conduct plaintext-recovery attacks against the initial bytes of a
stream by sniffing network traffic that occasionally relies on keys
affected by the Invariance Weakness, and then using a brute-force
approach involving LSB values, aka the "Bar Mitzvah" issue.
CVE-2015-3149
** RESERVED **
This candidate has been reserved by an organization or individual that
will use it when announcing a new security problem. When the
candidate has been publicized, the details for this candidate will be
provided.
CVE-2015-4000
The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is
enabled on a server but not on a client, does not properly convey a
DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct
cipher-downgrade attacks by rewriting a ClientHello with DHE replaced
by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT
replaced by DHE, aka the "Logjam" issue.
CVE-2015-4731
** RESERVED **
This candidate has been reserved by an organization or individual that
will use it when announcing a new security problem. When the
candidate has been publicized, the details for this candidate will be
provided.
CVE-2015-4732
** RESERVED **
This candidate has been reserved by an organization or individual that
will use it when announcing a new security problem. When the
candidate has been publicized, the details for this candidate will be
provided.
CVE-2015-4733
** RESERVED **
This candidate has been reserved by an organization or individual that
will use it when announcing a new security problem. When the
candidate has been publicized, the details for this candidate will be
provided.
CVE-2015-4748
** RESERVED **
This candidate has been reserved by an organization or individual that
will use it when announcing a new security problem. When the
candidate has been publicized, the details for this candidate will be
provided.
CVE-2015-4749
** RESERVED **
This candidate has been reserved by an organization or individual that
will use it when announcing a new security problem. When the
candidate has been publicized, the details for this candidate will be
provided.
CVE-2015-4760
** RESERVED **
This candidate has been reserved by an organization or individual that
will use it when announcing a new security problem. When the
candidate has been publicized, the details for this candidate will be
provided.

Version-Release number of selected component (if applicable):

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. java-1.8.0-openjdk-1.8.0.51-1.b16.el7.src.rpm
    MD5: ccd8144a613ba5f90436b40344259ff0
    SHA-256: 8699e59ae4d1c7b570c853c8f142cf4aeaba2ae4f050d7d0a4b2ba9a03b4cf23
    Size: 58.56 MB

Asianux Server 7 for x86_64
  1. java-1.8.0-openjdk-1.8.0.51-1.b16.el7.x86_64.rpm
    MD5: bb4f9b563e7b86eb024f155f881fbd07
    SHA-256: 60c7e9c1af4dda514183586e72f2cedc8e7db4097194626db035153ec5b7393a
    Size: 212.51 kB
  2. java-1.8.0-openjdk-devel-1.8.0.51-1.b16.el7.x86_64.rpm
    MD5: 287f617e19decbdb2387a2b1da1cc521
    SHA-256: 90878896878eaed9ab02e43496e1acf20bd399d04530477dea444c33f6563ca2
    Size: 9.61 MB
  3. java-1.8.0-openjdk-headless-1.8.0.51-1.b16.el7.x86_64.rpm
    MD5: 714d8a0214781c3bc69ee94f6277747a
    SHA-256: e77de2fec52883c8306232222ccc8160eccb0d3196c4220ae28bf322dc4e17bc
    Size: 30.99 MB