Amazon Linux 1 Security Advisory: ALAS-2018-1037
Advisory Release Date: 2018-06-08 18:32 Pacific
Advisory Updated Date: 2018-06-11 21:32 Pacific
An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load & Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.(CVE-2018-3639)
Affected Packages:
java-1.7.0-openjdk
Issue Correction:
Run yum update java-1.7.0-openjdk to update your system.
i686:
java-1.7.0-openjdk-debuginfo-1.7.0.181-2.6.14.8.80.amzn1.i686
java-1.7.0-openjdk-devel-1.7.0.181-2.6.14.8.80.amzn1.i686
java-1.7.0-openjdk-demo-1.7.0.181-2.6.14.8.80.amzn1.i686
java-1.7.0-openjdk-1.7.0.181-2.6.14.8.80.amzn1.i686
java-1.7.0-openjdk-src-1.7.0.181-2.6.14.8.80.amzn1.i686
noarch:
java-1.7.0-openjdk-javadoc-1.7.0.181-2.6.14.8.80.amzn1.noarch
src:
java-1.7.0-openjdk-1.7.0.181-2.6.14.8.80.amzn1.src
x86_64:
java-1.7.0-openjdk-src-1.7.0.181-2.6.14.8.80.amzn1.x86_64
java-1.7.0-openjdk-devel-1.7.0.181-2.6.14.8.80.amzn1.x86_64
java-1.7.0-openjdk-debuginfo-1.7.0.181-2.6.14.8.80.amzn1.x86_64
java-1.7.0-openjdk-1.7.0.181-2.6.14.8.80.amzn1.x86_64
java-1.7.0-openjdk-demo-1.7.0.181-2.6.14.8.80.amzn1.x86_64