Red Hat Customer Portal

Skip to main content

Security Advisory Important: java-1.8.0-openjdk security update

Advisory: RHSA-2014:1636-2
Type: Security Advisory
Severity: Important
Issued on: 2014-10-14
Last updated on: 2014-10-14
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Server EUS (v. 6.6.z)
Red Hat Enterprise Linux Workstation (v. 6)
CVEs (cve.mitre.org): CVE-2014-6457
CVE-2014-6468
CVE-2014-6502
CVE-2014-6504
CVE-2014-6506
CVE-2014-6511
CVE-2014-6512
CVE-2014-6517
CVE-2014-6519
CVE-2014-6531
CVE-2014-6558
CVE-2014-6562

Details

Updated java-1.8.0-openjdk packages that fix multiple security issues are
now available for Red Hat Enterprise Linux 6.

Red Hat Product Security has rated this update as having Important security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.

The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime
Environment and the OpenJDK 8 Java Software Development Kit.

It was discovered that the Libraries component in OpenJDK failed to
properly handle ZIP archives that contain entries with a NUL byte used in
the file names. An untrusted Java application or applet could use this flaw
to bypass Java sandbox restrictions. (CVE-2014-6562)

Multiple flaws were discovered in the Libraries, 2D, and Hotspot components
in OpenJDK. An untrusted Java application or applet could use these flaws
to bypass certain Java sandbox restrictions. (CVE-2014-6506, CVE-2014-6531,
CVE-2014-6502, CVE-2014-6511, CVE-2014-6504, CVE-2014-6519)

It was discovered that the StAX XML parser in the JAXP component in OpenJDK
performed expansion of external parameter entities even when external
entity substitution was disabled. A remote attacker could use this flaw to
perform XML eXternal Entity (XXE) attack against applications using the
StAX parser to parse untrusted XML documents. (CVE-2014-6517)

It was discovered that the Hotspot component in OpenJDK failed to properly
handle malformed Shared Archive files. A local attacker able to modify a
Shared Archive file used by a virtual machine of a different user could
possibly use this flaw to escalate their privileges. (CVE-2014-6468)

It was discovered that the DatagramSocket implementation in OpenJDK failed
to perform source address checks for packets received on a connected
socket. A remote attacker could use this flaw to have their packets
processed as if they were received from the expected source.
(CVE-2014-6512)

It was discovered that the TLS/SSL implementation in the JSSE component in
OpenJDK failed to properly verify the server identity during the
renegotiation following session resumption, making it possible for
malicious TLS/SSL servers to perform a Triple Handshake attack against
clients using JSSE and client certificate authentication. (CVE-2014-6457)

It was discovered that the CipherInputStream class implementation in
OpenJDK did not properly handle certain exceptions. This could possibly
allow an attacker to affect the integrity of an encrypted stream handled by
this class. (CVE-2014-6558)

The CVE-2014-6512 was discovered by Florian Weimer of Red Hat Product
Security.

All users of java-1.8.0-openjdk are advised to upgrade to these updated
packages, which resolve these issues. All running instances of OpenJDK Java
must be restarted for the update to take effect.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the
Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
java-1.8.0-openjdk-1.8.0.25-1.b17.el6.src.rpm
File outdated by:  RHEA-2016:0816
    MD5: 068c71ce2460ed0d985e6fd41badfa20
SHA-256: dd2f075b9e0bd0c9dcc7a05b27e4838aa3a594a6403400bb1955840544d7b708
 
IA-32:
java-1.8.0-openjdk-1.8.0.25-1.b17.el6.i686.rpm
File outdated by:  RHEA-2016:0816
    MD5: 6c51f2d8c833b3fdc5381a8bb4c2f462
SHA-256: 2bf2b9fee34207ee8a9df9a178c1a1cb654627ba47a47c3de8cd352dd0b06bba
java-1.8.0-openjdk-debuginfo-1.8.0.25-1.b17.el6.i686.rpm
File outdated by:  RHEA-2016:0816
    MD5: ad262cf8072bee60109fd1e688d738a7
SHA-256: 5e93d5e086ed1f13fa0e947bf9c4fc8ae8993f65969e12e470bb6125c55ba173
java-1.8.0-openjdk-demo-1.8.0.25-1.b17.el6.i686.rpm
File outdated by:  RHEA-2016:0816
    MD5: 6b9a43f8be44130a8e4d7197d215b4b7
SHA-256: 4d5291bfcd43b16466447258980cf3d4cbd80e0b0396c95ef4a2c58d2f9603af
java-1.8.0-openjdk-devel-1.8.0.25-1.b17.el6.i686.rpm
File outdated by:  RHEA-2016:0816
    MD5: 20118a9c68f49c88457b2ff35f754d0c
SHA-256: b460b8f7312d748fae4de9057f52cbca4144685457672d0f931079bd4aa810bf
java-1.8.0-openjdk-headless-1.8.0.25-1.b17.el6.i686.rpm
File outdated by:  RHEA-2016:0816
    MD5: 7f49fd7c675e500c2d6dab319f9ca9ba
SHA-256: 63b95d9f33ffa33b12d9960d2f2124b1773849d7ad4722ff9773f5f95984231d
java-1.8.0-openjdk-javadoc-1.8.0.25-1.b17.el6.noarch.rpm
File outdated by:  RHEA-2016:0816
    MD5: bddd4b87a154069876e417d7d04c3a11
SHA-256: 1af9b3fdf5f3ceb62c1bd14c3f79b6ccdd9525e277382a6a1dfe255ff6ba0cf9
java-1.8.0-openjdk-src-1.8.0.25-1.b17.el6.i686.rpm
File outdated by:  RHEA-2016:0816
    MD5: 73ecd140f256d86b505adafbcd2cfa0d
SHA-256: 9ad34420718d8ada3d64458b998e2254926dbd63823b64cf0536520b704777f1
 
x86_64:
java-1.8.0-openjdk-1.8.0.25-1.b17.el6.x86_64.rpm
File outdated by:  RHEA-2016:0816
    MD5: af0483401ef280607147fabcaa05d8ad
SHA-256: bf8dff88f218f7d7dc55c320b7bad045fd3ed73de9500c194561c324f7d7b234
java-1.8.0-openjdk-debuginfo-1.8.0.25-1.b17.el6.x86_64.rpm
File outdated by:  RHEA-2016:0816
    MD5: 9ae1791627fd156892d864ef439eeff1
SHA-256: d2d9e2337d351ebb3133b5dfed75f2177610651ebacaf31912b2fb5406669576
java-1.8.0-openjdk-demo-1.8.0.25-1.b17.el6.x86_64.rpm
File outdated by:  RHEA-2016:0816
    MD5: 931c5761de9aeeb1f8cffc884377e7b0
SHA-256: 8851782960e3472b0b7e53089ba2ab47c0eb04aa067003c9e6017ff66a44b09a
java-1.8.0-openjdk-devel-1.8.0.25-1.b17.el6.x86_64.rpm
File outdated by:  RHEA-2016:0816
    MD5: b7843633f345449239d5ac564f258507
SHA-256: f75e909068d95135a654669f0814d7c4b76eb0746090908f96a9a2620ed215f4
java-1.8.0-openjdk-headless-1.8.0.25-1.b17.el6.x86_64.rpm
File outdated by:  RHEA-2016:0816
    MD5: 43242a44c96d176f7248eea7ba94cfaf
SHA-256: 3b639d153a1db08182f70c18f8234c8a3597b4e71f5b72e905724803efdb1106
java-1.8.0-openjdk-javadoc-1.8.0.25-1.b17.el6.noarch.rpm
File outdated by:  RHEA-2016:0816
    MD5: bddd4b87a154069876e417d7d04c3a11
SHA-256: 1af9b3fdf5f3ceb62c1bd14c3f79b6ccdd9525e277382a6a1dfe255ff6ba0cf9
java-1.8.0-openjdk-src-1.8.0.25-1.b17.el6.x86_64.rpm
File outdated by:  RHEA-2016:0816
    MD5: 5bccba0065182c5faa71cc78d198d717
SHA-256: 24d6c25e79b74b4a1d27e827b3bf939bfaa26333a95ec9a9e5dbef05b0886b63
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
java-1.8.0-openjdk-1.8.0.25-1.b17.el6.src.rpm
File outdated by:  RHEA-2016:0816
    MD5: 068c71ce2460ed0d985e6fd41badfa20
SHA-256: dd2f075b9e0bd0c9dcc7a05b27e4838aa3a594a6403400bb1955840544d7b708
 
x86_64:
java-1.8.0-openjdk-1.8.0.25-1.b17.el6.x86_64.rpm
File outdated by:  RHEA-2016:0816
    MD5: af0483401ef280607147fabcaa05d8ad
SHA-256: bf8dff88f218f7d7dc55c320b7bad045fd3ed73de9500c194561c324f7d7b234
java-1.8.0-openjdk-debuginfo-1.8.0.25-1.b17.el6.x86_64.rpm
File outdated by:  RHEA-2016:0816
    MD5: 9ae1791627fd156892d864ef439eeff1
SHA-256: d2d9e2337d351ebb3133b5dfed75f2177610651ebacaf31912b2fb5406669576
java-1.8.0-openjdk-demo-1.8.0.25-1.b17.el6.x86_64.rpm
File outdated by:  RHEA-2016:0816
    MD5: 931c5761de9aeeb1f8cffc884377e7b0
SHA-256: 8851782960e3472b0b7e53089ba2ab47c0eb04aa067003c9e6017ff66a44b09a
java-1.8.0-openjdk-devel-1.8.0.25-1.b17.el6.x86_64.rpm
File outdated by:  RHSA-2015:1228
    MD5: b7843633f345449239d5ac564f258507
SHA-256: f75e909068d95135a654669f0814d7c4b76eb0746090908f96a9a2620ed215f4
java-1.8.0-openjdk-headless-1.8.0.25-1.b17.el6.x86_64.rpm
File outdated by:  RHEA-2016:0816
    MD5: 43242a44c96d176f7248eea7ba94cfaf
SHA-256: 3b639d153a1db08182f70c18f8234c8a3597b4e71f5b72e905724803efdb1106
java-1.8.0-openjdk-javadoc-1.8.0.25-1.b17.el6.noarch.rpm
File outdated by:  RHEA-2016:0816
    MD5: bddd4b87a154069876e417d7d04c3a11
SHA-256: 1af9b3fdf5f3ceb62c1bd14c3f79b6ccdd9525e277382a6a1dfe255ff6ba0cf9
java-1.8.0-openjdk-src-1.8.0.25-1.b17.el6.x86_64.rpm
File outdated by:  RHEA-2016:0816
    MD5: 5bccba0065182c5faa71cc78d198d717
SHA-256: 24d6c25e79b74b4a1d27e827b3bf939bfaa26333a95ec9a9e5dbef05b0886b63
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
java-1.8.0-openjdk-1.8.0.25-1.b17.el6.src.rpm
File outdated by:  RHEA-2016:0816
    MD5: 068c71ce2460ed0d985e6fd41badfa20
SHA-256: dd2f075b9e0bd0c9dcc7a05b27e4838aa3a594a6403400bb1955840544d7b708
 
IA-32:
java-1.8.0-openjdk-1.8.0.25-1.b17.el6.i686.rpm
File outdated by:  RHEA-2016:0816
    MD5: 6c51f2d8c833b3fdc5381a8bb4c2f462
SHA-256: 2bf2b9fee34207ee8a9df9a178c1a1cb654627ba47a47c3de8cd352dd0b06bba
java-1.8.0-openjdk-debuginfo-1.8.0.25-1.b17.el6.i686.rpm
File outdated by:  RHEA-2016:0816
    MD5: ad262cf8072bee60109fd1e688d738a7
SHA-256: 5e93d5e086ed1f13fa0e947bf9c4fc8ae8993f65969e12e470bb6125c55ba173
java-1.8.0-openjdk-demo-1.8.0.25-1.b17.el6.i686.rpm
File outdated by:  RHEA-2016:0816
    MD5: 6b9a43f8be44130a8e4d7197d215b4b7
SHA-256: 4d5291bfcd43b16466447258980cf3d4cbd80e0b0396c95ef4a2c58d2f9603af
java-1.8.0-openjdk-devel-1.8.0.25-1.b17.el6.i686.rpm
File outdated by:  RHEA-2016:0816
    MD5: 20118a9c68f49c88457b2ff35f754d0c
SHA-256: b460b8f7312d748fae4de9057f52cbca4144685457672d0f931079bd4aa810bf
java-1.8.0-openjdk-headless-1.8.0.25-1.b17.el6.i686.rpm
File outdated by:  RHEA-2016:0816
    MD5: 7f49fd7c675e500c2d6dab319f9ca9ba
SHA-256: 63b95d9f33ffa33b12d9960d2f2124b1773849d7ad4722ff9773f5f95984231d
java-1.8.0-openjdk-javadoc-1.8.0.25-1.b17.el6.noarch.rpm
File outdated by:  RHEA-2016:0816
    MD5: bddd4b87a154069876e417d7d04c3a11
SHA-256: 1af9b3fdf5f3ceb62c1bd14c3f79b6ccdd9525e277382a6a1dfe255ff6ba0cf9
java-1.8.0-openjdk-src-1.8.0.25-1.b17.el6.i686.rpm
File outdated by:  RHEA-2016:0816
    MD5: 73ecd140f256d86b505adafbcd2cfa0d
SHA-256: 9ad34420718d8ada3d64458b998e2254926dbd63823b64cf0536520b704777f1
 
x86_64:
java-1.8.0-openjdk-1.8.0.25-1.b17.el6.x86_64.rpm
File outdated by:  RHEA-2016:0816
    MD5: af0483401ef280607147fabcaa05d8ad
SHA-256: bf8dff88f218f7d7dc55c320b7bad045fd3ed73de9500c194561c324f7d7b234
java-1.8.0-openjdk-debuginfo-1.8.0.25-1.b17.el6.x86_64.rpm
File outdated by:  RHEA-2016:0816
    MD5: 9ae1791627fd156892d864ef439eeff1
SHA-256: d2d9e2337d351ebb3133b5dfed75f2177610651ebacaf31912b2fb5406669576
java-1.8.0-openjdk-demo-1.8.0.25-1.b17.el6.x86_64.rpm
File outdated by:  RHEA-2016:0816
    MD5: 931c5761de9aeeb1f8cffc884377e7b0
SHA-256: 8851782960e3472b0b7e53089ba2ab47c0eb04aa067003c9e6017ff66a44b09a
java-1.8.0-openjdk-devel-1.8.0.25-1.b17.el6.x86_64.rpm
File outdated by:  RHEA-2016:0816
    MD5: b7843633f345449239d5ac564f258507
SHA-256: f75e909068d95135a654669f0814d7c4b76eb0746090908f96a9a2620ed215f4
java-1.8.0-openjdk-headless-1.8.0.25-1.b17.el6.x86_64.rpm
File outdated by:  RHEA-2016:0816
    MD5: 43242a44c96d176f7248eea7ba94cfaf
SHA-256: 3b639d153a1db08182f70c18f8234c8a3597b4e71f5b72e905724803efdb1106
java-1.8.0-openjdk-javadoc-1.8.0.25-1.b17.el6.noarch.rpm
File outdated by:  RHEA-2016:0816
    MD5: bddd4b87a154069876e417d7d04c3a11
SHA-256: 1af9b3fdf5f3ceb62c1bd14c3f79b6ccdd9525e277382a6a1dfe255ff6ba0cf9
java-1.8.0-openjdk-src-1.8.0.25-1.b17.el6.x86_64.rpm
File outdated by:  RHEA-2016:0816
    MD5: 5bccba0065182c5faa71cc78d198d717
SHA-256: 24d6c25e79b74b4a1d27e827b3bf939bfaa26333a95ec9a9e5dbef05b0886b63
 
Red Hat Enterprise Linux Server EUS (v. 6.6.z)

SRPMS:
java-1.8.0-openjdk-1.8.0.25-1.b17.el6.src.rpm
File outdated by:  RHEA-2016:0816
    MD5: 068c71ce2460ed0d985e6fd41badfa20
SHA-256: dd2f075b9e0bd0c9dcc7a05b27e4838aa3a594a6403400bb1955840544d7b708
 
IA-32:
java-1.8.0-openjdk-1.8.0.25-1.b17.el6.i686.rpm
File outdated by:  RHSA-2015:1228
    MD5: 6c51f2d8c833b3fdc5381a8bb4c2f462
SHA-256: 2bf2b9fee34207ee8a9df9a178c1a1cb654627ba47a47c3de8cd352dd0b06bba
java-1.8.0-openjdk-debuginfo-1.8.0.25-1.b17.el6.i686.rpm
File outdated by:  RHSA-2015:1228
    MD5: ad262cf8072bee60109fd1e688d738a7
SHA-256: 5e93d5e086ed1f13fa0e947bf9c4fc8ae8993f65969e12e470bb6125c55ba173
java-1.8.0-openjdk-demo-1.8.0.25-1.b17.el6.i686.rpm
File outdated by:  RHSA-2015:1228
    MD5: 6b9a43f8be44130a8e4d7197d215b4b7
SHA-256: 4d5291bfcd43b16466447258980cf3d4cbd80e0b0396c95ef4a2c58d2f9603af
java-1.8.0-openjdk-devel-1.8.0.25-1.b17.el6.i686.rpm
File outdated by:  RHSA-2015:1228
    MD5: 20118a9c68f49c88457b2ff35f754d0c
SHA-256: b460b8f7312d748fae4de9057f52cbca4144685457672d0f931079bd4aa810bf
java-1.8.0-openjdk-headless-1.8.0.25-1.b17.el6.i686.rpm
File outdated by:  RHSA-2015:1228
    MD5: 7f49fd7c675e500c2d6dab319f9ca9ba
SHA-256: 63b95d9f33ffa33b12d9960d2f2124b1773849d7ad4722ff9773f5f95984231d
java-1.8.0-openjdk-javadoc-1.8.0.25-1.b17.el6.noarch.rpm
File outdated by:  RHSA-2015:1228
    MD5: bddd4b87a154069876e417d7d04c3a11
SHA-256: 1af9b3fdf5f3ceb62c1bd14c3f79b6ccdd9525e277382a6a1dfe255ff6ba0cf9
java-1.8.0-openjdk-src-1.8.0.25-1.b17.el6.i686.rpm
File outdated by:  RHSA-2015:1228
    MD5: 73ecd140f256d86b505adafbcd2cfa0d
SHA-256: 9ad34420718d8ada3d64458b998e2254926dbd63823b64cf0536520b704777f1
 
x86_64:
java-1.8.0-openjdk-1.8.0.25-1.b17.el6.x86_64.rpm
File outdated by:  RHSA-2015:0069
    MD5: af0483401ef280607147fabcaa05d8ad
SHA-256: bf8dff88f218f7d7dc55c320b7bad045fd3ed73de9500c194561c324f7d7b234
java-1.8.0-openjdk-debuginfo-1.8.0.25-1.b17.el6.x86_64.rpm
File outdated by:  RHSA-2015:1228
    MD5: 9ae1791627fd156892d864ef439eeff1
SHA-256: d2d9e2337d351ebb3133b5dfed75f2177610651ebacaf31912b2fb5406669576
java-1.8.0-openjdk-demo-1.8.0.25-1.b17.el6.x86_64.rpm
File outdated by:  RHSA-2015:1228
    MD5: 931c5761de9aeeb1f8cffc884377e7b0
SHA-256: 8851782960e3472b0b7e53089ba2ab47c0eb04aa067003c9e6017ff66a44b09a
java-1.8.0-openjdk-devel-1.8.0.25-1.b17.el6.x86_64.rpm
File outdated by:  RHSA-2015:0069
    MD5: b7843633f345449239d5ac564f258507
SHA-256: f75e909068d95135a654669f0814d7c4b76eb0746090908f96a9a2620ed215f4
java-1.8.0-openjdk-headless-1.8.0.25-1.b17.el6.x86_64.rpm
File outdated by:  RHSA-2015:0069
    MD5: 43242a44c96d176f7248eea7ba94cfaf
SHA-256: 3b639d153a1db08182f70c18f8234c8a3597b4e71f5b72e905724803efdb1106
java-1.8.0-openjdk-javadoc-1.8.0.25-1.b17.el6.noarch.rpm
File outdated by:  RHSA-2015:1228
    MD5: bddd4b87a154069876e417d7d04c3a11
SHA-256: 1af9b3fdf5f3ceb62c1bd14c3f79b6ccdd9525e277382a6a1dfe255ff6ba0cf9
java-1.8.0-openjdk-src-1.8.0.25-1.b17.el6.x86_64.rpm
File outdated by:  RHSA-2015:1228
    MD5: 5bccba0065182c5faa71cc78d198d717
SHA-256: 24d6c25e79b74b4a1d27e827b3bf939bfaa26333a95ec9a9e5dbef05b0886b63
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
java-1.8.0-openjdk-1.8.0.25-1.b17.el6.src.rpm
File outdated by:  RHEA-2016:0816
    MD5: 068c71ce2460ed0d985e6fd41badfa20
SHA-256: dd2f075b9e0bd0c9dcc7a05b27e4838aa3a594a6403400bb1955840544d7b708
 
IA-32:
java-1.8.0-openjdk-1.8.0.25-1.b17.el6.i686.rpm
File outdated by:  RHEA-2016:0816
    MD5: 6c51f2d8c833b3fdc5381a8bb4c2f462
SHA-256: 2bf2b9fee34207ee8a9df9a178c1a1cb654627ba47a47c3de8cd352dd0b06bba
java-1.8.0-openjdk-debuginfo-1.8.0.25-1.b17.el6.i686.rpm
File outdated by:  RHEA-2016:0816
    MD5: ad262cf8072bee60109fd1e688d738a7
SHA-256: 5e93d5e086ed1f13fa0e947bf9c4fc8ae8993f65969e12e470bb6125c55ba173
java-1.8.0-openjdk-demo-1.8.0.25-1.b17.el6.i686.rpm
File outdated by:  RHEA-2016:0816
    MD5: 6b9a43f8be44130a8e4d7197d215b4b7
SHA-256: 4d5291bfcd43b16466447258980cf3d4cbd80e0b0396c95ef4a2c58d2f9603af
java-1.8.0-openjdk-devel-1.8.0.25-1.b17.el6.i686.rpm
File outdated by:  RHEA-2016:0816
    MD5: 20118a9c68f49c88457b2ff35f754d0c
SHA-256: b460b8f7312d748fae4de9057f52cbca4144685457672d0f931079bd4aa810bf
java-1.8.0-openjdk-headless-1.8.0.25-1.b17.el6.i686.rpm
File outdated by:  RHEA-2016:0816
    MD5: 7f49fd7c675e500c2d6dab319f9ca9ba
SHA-256: 63b95d9f33ffa33b12d9960d2f2124b1773849d7ad4722ff9773f5f95984231d
java-1.8.0-openjdk-javadoc-1.8.0.25-1.b17.el6.noarch.rpm
File outdated by:  RHEA-2016:0816
    MD5: bddd4b87a154069876e417d7d04c3a11
SHA-256: 1af9b3fdf5f3ceb62c1bd14c3f79b6ccdd9525e277382a6a1dfe255ff6ba0cf9
java-1.8.0-openjdk-src-1.8.0.25-1.b17.el6.i686.rpm
File outdated by:  RHEA-2016:0816
    MD5: 73ecd140f256d86b505adafbcd2cfa0d
SHA-256: 9ad34420718d8ada3d64458b998e2254926dbd63823b64cf0536520b704777f1
 
x86_64:
java-1.8.0-openjdk-1.8.0.25-1.b17.el6.x86_64.rpm
File outdated by:  RHEA-2016:0816
    MD5: af0483401ef280607147fabcaa05d8ad
SHA-256: bf8dff88f218f7d7dc55c320b7bad045fd3ed73de9500c194561c324f7d7b234
java-1.8.0-openjdk-debuginfo-1.8.0.25-1.b17.el6.x86_64.rpm
File outdated by:  RHEA-2016:0816
    MD5: 9ae1791627fd156892d864ef439eeff1
SHA-256: d2d9e2337d351ebb3133b5dfed75f2177610651ebacaf31912b2fb5406669576
java-1.8.0-openjdk-demo-1.8.0.25-1.b17.el6.x86_64.rpm
File outdated by:  RHEA-2016:0816
    MD5: 931c5761de9aeeb1f8cffc884377e7b0
SHA-256: 8851782960e3472b0b7e53089ba2ab47c0eb04aa067003c9e6017ff66a44b09a
java-1.8.0-openjdk-devel-1.8.0.25-1.b17.el6.x86_64.rpm
File outdated by:  RHEA-2016:0816
    MD5: b7843633f345449239d5ac564f258507
SHA-256: f75e909068d95135a654669f0814d7c4b76eb0746090908f96a9a2620ed215f4
java-1.8.0-openjdk-headless-1.8.0.25-1.b17.el6.x86_64.rpm
File outdated by:  RHEA-2016:0816
    MD5: 43242a44c96d176f7248eea7ba94cfaf
SHA-256: 3b639d153a1db08182f70c18f8234c8a3597b4e71f5b72e905724803efdb1106
java-1.8.0-openjdk-javadoc-1.8.0.25-1.b17.el6.noarch.rpm
File outdated by:  RHEA-2016:0816
    MD5: bddd4b87a154069876e417d7d04c3a11
SHA-256: 1af9b3fdf5f3ceb62c1bd14c3f79b6ccdd9525e277382a6a1dfe255ff6ba0cf9
java-1.8.0-openjdk-src-1.8.0.25-1.b17.el6.x86_64.rpm
File outdated by:  RHEA-2016:0816
    MD5: 5bccba0065182c5faa71cc78d198d717
SHA-256: 24d6c25e79b74b4a1d27e827b3bf939bfaa26333a95ec9a9e5dbef05b0886b63
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

1071210 - CVE-2014-6512 OpenJDK: DatagramSocket connected socket missing source check (Libraries, 8039509)
1150155 - CVE-2014-6506 OpenJDK: insufficient permission checks when setting resource bundle on system logger (Libraries, 8041564)
1150182 - CVE-2014-6504 OpenJDK: incorrect optimization of range checks in C2 compiler (Hotspot, 8022783)
1150273 - CVE-2014-6519 OpenJDK: missing BootstrapMethods bounds check (Hotspot, 8041717)
1150651 - CVE-2014-6531 OpenJDK: insufficient ResourceBundle name check (Libraries, 8044274)
1150669 - CVE-2014-6502 OpenJDK: LogRecord use of incorrect CL when loading ResourceBundle (Libraries, 8042797)
1151046 - CVE-2014-6457 OpenJDK: Triple Handshake attack against TLS/SSL connections (JSSE, 8037066)
1151063 - CVE-2014-6558 OpenJDK: CipherInputStream incorrect exception handling (Security, 8037846)
1151364 - CVE-2014-6517 OpenJDK: StAX parser parameter entity XXE (JAXP, 8039533)
1151517 - CVE-2014-6511 ICU: Layout Engine ContextualSubstitution missing boundary checks (JDK 2D, 8041540)
1151988 - CVE-2014-6562 OpenJDK: incorrect handling of zip entries with NUL in name (Libraries, 8048025)
1152049 - CVE-2014-6468 OpenJDK: insufficient SharedArchiveFile checks (Hotspot, 8044269)


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/