Woonsan,

On 5/25/16 11:29 AM, Woonsan Ko wrote:
> On Wed, May 25, 2016 at 11:12 AM, Christopher Schultz
> <ch...@christopherschultz.net> wrote:
> Mark,
> 
> On 5/24/16 10:06 AM, Mark Thomas wrote:
>>>> TL;DR If you use remote JMX, you need to update your JVM to address
>>>> CVE-2016-3427
>>>>
>>>> For the longer version, see the blog post I just published on
>>>> this: http://engineering.pivotal.io/post/java-deserialization-jmx/
> 
> Okay, I give up: what version of Java 8 actually has this patch?
> Oracle's site gives me the runaround and tells me that it's been patched
> in April, but I have no idea what version of Java was published in
> April, and Oracle's site seems very reticent to tell me :(
> 
> The CVEs have virtuall no information other than "something bad exists
> in some versions of some stuff, and you should upgrade". Upgrade to what
> ?
> 
>> When I clicked on the CVE link and the link to oracle page onward in
>> the Reference section
>> (CONFIRM:http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html),
>> I could see the Java version ("Supported Versions Affected" column) in
>> the table when I look up "CVE-2016-3427".

Right:

"Java SE: 6u113, 7u99, 8u77; Java SE Embedded: 8u77; JRockit: R28.3.9"

I have Java 1.8.0_91. Am I affected? What about if I had Java 1.8.0_60?

That doesn't give a version range. It makes it seem like only that
version number was affected. It also doesn't say what version has the
fix. What if you are on a beta-release schedule and you have out-of-band
updates from the public ones? What about Java 9? What about Java 5?

The documentation is just horrible.

-chris

Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to