MGASA-2018-0298

Source
https://advisories.mageia.org/MGASA-2018-0298.html
Import Source
https://advisories.mageia.org/MGASA-2018-0298.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2018-0298
Related
Published
2018-07-01T17:17:14Z
Modified
2018-07-01T16:39:24Z
Summary
Updated java-1.8.0-openjdk packages fix security vulnerability
Details

Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4. (CVE-2018-3639)

References
Credits

Affected packages

Mageia:6 / java-1.8.0-openjdk

Package

Name
java-1.8.0-openjdk
Purl
pkg:rpm/mageia/java-1.8.0-openjdk?distro=mageia-6

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.8.0.172-1.b11.1.mga6

Ecosystem specific

{
    "section": "core"
}

Mageia:6 / copy-jdk-configs

Package

Name
copy-jdk-configs
Purl
pkg:rpm/mageia/copy-jdk-configs?distro=mageia-6

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.7-1.mga6

Ecosystem specific

{
    "section": "core"
}