Action not permitted
Modal body text goes here.
CVE-2018-2964
Vulnerability from cvelistv5
Vendor | Product | Version | |
---|---|---|---|
▼ | Oracle Corporation | Java |
Version: Java SE: 8u172 Version: 10.0.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T04:36:39.462Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "name": "104780", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/104780" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20180726-0001/" }, { "name": "RHSA-2018:2256", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2256" }, { "name": "RHSA-2018:2253", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2253" }, { "name": "1041302", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1041302" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2018-2964", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-02T18:16:39.452138Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-02T20:13:21.084Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Java", "vendor": "Oracle Corporation", "versions": [ { "status": "affected", "version": "Java SE: 8u172" }, { "status": "affected", "version": "10.0.1" } ] } ], "datePublic": "2018-03-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 8u172 and 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H)." } ], "problemTypes": [ { "descriptions": [ { "description": "Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE.", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-07-27T09:57:01", "orgId": "43595867-4340-4103-b7a2-9a5208d29a85", "shortName": "oracle" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "name": "104780", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/104780" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20180726-0001/" }, { "name": "RHSA-2018:2256", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2256" }, { "name": "RHSA-2018:2253", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2253" }, { "name": "1041302", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1041302" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert_us@oracle.com", "ID": "CVE-2018-2964", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Java", "version": { "version_data": [ { "version_affected": "=", "version_value": "Java SE: 8u172" }, { "version_affected": "=", "version_value": "10.0.1" } ] } } ] }, "vendor_name": "Oracle Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 8u172 and 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE." } ] } ] }, "references": { "reference_data": [ { "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "name": "104780", "refsource": "BID", "url": "http://www.securityfocus.com/bid/104780" }, { "name": "https://security.netapp.com/advisory/ntap-20180726-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20180726-0001/" }, { "name": "RHSA-2018:2256", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2256" }, { "name": "RHSA-2018:2253", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2253" }, { "name": "1041302", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1041302" } ] } } } }, "cveMetadata": { "assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85", "assignerShortName": "oracle", "cveId": "CVE-2018-2964", "datePublished": "2018-07-18T13:00:00", "dateReserved": "2017-12-15T00:00:00", "dateUpdated": "2024-10-02T20:13:21.084Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2018-2964\",\"sourceIdentifier\":\"secalert_us@oracle.com\",\"published\":\"2018-07-18T13:29:03.507\",\"lastModified\":\"2024-11-21T04:04:51.237\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 8u172 and 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad en el componente Java SE de Oracle Java SE (subcomponente: Deployment). Las versiones compatibles que se han visto afectadas son JavaSE: 8u172 y 10.0.1. Una vulnerabilidad dif\u00edcilmente explotable permite que un atacante sin autenticar que tenga acceso a red por m\u00faltiples protocolos comprometa la seguridad de Java SE. Para que los ataques tengan \u00e9xito, se necesita la participaci\u00f3n de otra persona diferente del atacante y, aunque la vulnerabilidad est\u00e1 presente en Java SE, los ataques podr\u00edan afectar seriamente a productos adicionales. Los ataques exitosos a esta vulnerabilidad pueden resultar en la toma de control de Java SE. Nota: esta vulnerabilidad se aplica a implementaciones Java, normalmente en clientes que ejecutan aplicaciones Java Web Start en sandbox o applets Java en sandbox que cargan y ejecutan c\u00f3digo que no es de confianza (por ejemplo, c\u00f3digo proveniente de internet) y que conf\u00edan en la sandbox de aislado Java para protegerse. Esta vulnerabilidad no se aplica a implementaciones Java, normalmente en servidores, que solo cargan y ejecutan c\u00f3digo de confianza (por ejemplo, c\u00f3digo instalado por un administrador). CVSS 3.0 Base Score 8.3 (impactos en la confidencialidad, integridad y disponibilidad). Vector CVSS: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H\",\"baseScore\":8.3,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.6,\"impactScore\":6.0}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:H/Au:N/C:P/I:P/A:P\",\"baseScore\":5.1,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"HIGH\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":4.9,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.8.0:update172:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6BB93E3-3983-40FD-A119-11334C707755\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:10.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C103C17-E4A9-40A2-959B-29547D706DFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.8.0:update172:*:*:*:*:*:*\",\"matchCriteriaId\":\"788BDADB-6F4E-4DFD-BE2E-2D9B3AFBA5CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:10.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EBB11AD-EA72-4C15-945E-D335A1BF0979\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*\",\"matchCriteriaId\":\"3A756737-1CC4-42C2-A4DF-E1C893B4E2D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*\",\"matchCriteriaId\":\"B55E8D50-99B4-47EC-86F9-699B67D473CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C2089EE-5D7F-47EC-8EA5-0F69790564C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.0\",\"versionEndIncluding\":\"11.70.1\",\"matchCriteriaId\":\"73F81EC3-4AB0-4CD7-B845-267C5974DE98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D9CC59D-6182-4B5E-96B5-226FCD343916\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1BE6C1F-2565-4E97-92AA-16563E5660A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C18CA4B5-28FD-4199-B1F0-B1E59E920370\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5735E553-9731-4AAC-BCFF-989377F817B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FFE0A9D2-9A49-4BF6-BC6F-8249162D8334\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*\",\"matchCriteriaId\":\"25BBBC1A-228F-45A6-AE95-DB915EDF84BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:sap:*:*\",\"matchCriteriaId\":\"C57D2B31-9696-4451-BA04-D093FFCF7E39\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E94F7F59-1785-493F-91A7-5F5EA5E87E4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*\",\"versionStartIncluding\":\"9.7\",\"matchCriteriaId\":\"9DBEE506-E864-4FC6-B5D3-7E134438592C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"9.7\",\"matchCriteriaId\":\"5E73AC99-34AC-4D4B-A946-34F33AAEC4A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:9.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF20DCD2-7BDD-4BD1-8B29-9216E881EA8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*\",\"versionStartIncluding\":\"9.7\",\"matchCriteriaId\":\"D4BE7695-11DB-4F04-A469-91A29A83B358\"}]}]}],\"references\":[{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/104780\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1041302\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2253\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2256\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20180726-0001/\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/104780\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1041302\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2253\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2256\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20180726-0001/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
ghsa-2q7m-m9fq-g952
Vulnerability from github
Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 8u172 and 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
{ "affected": [], "aliases": [ "CVE-2018-2964" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2018-07-18T13:29:00Z", "severity": "HIGH" }, "details": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 8u172 and 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "id": "GHSA-2q7m-m9fq-g952", "modified": "2022-05-13T01:17:20Z", "published": "2022-05-13T01:17:20Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-2964" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:2253" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:2256" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20180726-0001" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/104780" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1041302" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
rhsa-2018_2256
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for java-1.8.0-oracle is now available for Oracle Java for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Oracle Java SE version 8 includes the Oracle Java Runtime Environment and the Oracle Java Software Development Kit.\n\nThis update upgrades Oracle Java SE 8 to version 8 Update 181.\n\nSecurity Fix(es):\n\n* Oracle JDK: unspecified vulnerability fixed in 7u191, 8u181, and 10.0.2 (JavaFX) (CVE-2018-2941)\n\n* Oracle JDK: unspecified vulnerability fixed in 8u181 and 10.0.2 (Deployment) (CVE-2018-2964)\n\n* Oracle JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (Libraries) (CVE-2018-2940)\n\n* OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547) (CVE-2018-2952)\n\n* Oracle JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (JSSE) (CVE-2018-2973)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:2256", "url": "https://access.redhat.com/errata/RHSA-2018:2256" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "1600925", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1600925" }, { "category": "external", "summary": "1602142", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1602142" }, { "category": "external", "summary": "1602143", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1602143" }, { "category": "external", "summary": "1602145", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1602145" }, { "category": "external", "summary": "1602146", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1602146" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2256.json" } ], "title": "Red Hat Security Advisory: java-1.8.0-oracle security update", "tracking": { "current_release_date": "2024-11-15T02:11:58+00:00", "generator": { "date": "2024-11-15T02:11:58+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2018:2256", "initial_release_date": "2018-07-24T21:09:42+00:00", "revision_history": [ { "date": "2018-07-24T21:09:42+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-07-24T21:09:42+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T02:11:58+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Oracle Java for Red Hat Enterprise Linux Desktop 6", "product": { "name": "Oracle Java for Red Hat Enterprise Linux Desktop 6", "product_id": "6Client-OracleJava-6.10.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_oracle_java:6" } } }, { "category": "product_name", "name": "Oracle Java for Red Hat Enterprise Linux HPC Node 6", "product": { "name": "Oracle Java for Red Hat Enterprise Linux HPC Node 6", "product_id": "6ComputeNode-OracleJava-6.10.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_oracle_java:6" } } }, { "category": "product_name", "name": "Oracle Java for Red Hat Enterprise Linux Server 6", "product": { "name": "Oracle Java for Red Hat Enterprise Linux Server 6", "product_id": "6Server-OracleJava-6.10.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_oracle_java:6" } } }, { "category": "product_name", "name": "Oracle Java for Red Hat Enterprise Linux Workstation 6", "product": { "name": "Oracle Java for Red Hat Enterprise Linux Workstation 6", "product_id": "6Workstation-OracleJava-6.10.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_oracle_java:6" } } } ], "category": "product_family", "name": "Oracle Java for Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "product": { "name": "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "product_id": "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-oracle-jdbc@1.8.0.181-1jpp.2.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "product": { "name": "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "product_id": "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-oracle-src@1.8.0.181-1jpp.2.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "product": { "name": "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "product_id": "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-oracle-javafx@1.8.0.181-1jpp.2.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "product": { "name": "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "product_id": "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-oracle-plugin@1.8.0.181-1jpp.2.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "product": { "name": "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "product_id": "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-oracle-devel@1.8.0.181-1jpp.2.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "product": { "name": "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "product_id": "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-oracle@1.8.0.181-1jpp.2.el6?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "product": { "name": "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "product_id": "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-oracle-jdbc@1.8.0.181-1jpp.2.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "product": { "name": "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "product_id": "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-oracle-src@1.8.0.181-1jpp.2.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "product": { "name": "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "product_id": "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-oracle-javafx@1.8.0.181-1jpp.2.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "product": { "name": "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "product_id": "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-oracle-plugin@1.8.0.181-1jpp.2.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "product": { "name": "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "product_id": "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-oracle-devel@1.8.0.181-1jpp.2.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "product": { "name": "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "product_id": "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-oracle@1.8.0.181-1jpp.2.el6?arch=i686\u0026epoch=1" } } } ], "category": "architecture", "name": "i686" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Desktop 6", "product_id": "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686" }, "product_reference": "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "relates_to_product_reference": "6Client-OracleJava-6.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Desktop 6", "product_id": "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64" }, "product_reference": "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "relates_to_product_reference": "6Client-OracleJava-6.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Desktop 6", "product_id": "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686" }, "product_reference": "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "relates_to_product_reference": "6Client-OracleJava-6.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Desktop 6", "product_id": "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64" }, "product_reference": "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "relates_to_product_reference": "6Client-OracleJava-6.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Desktop 6", "product_id": "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686" }, "product_reference": "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "relates_to_product_reference": "6Client-OracleJava-6.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Desktop 6", "product_id": "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64" }, "product_reference": "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "relates_to_product_reference": "6Client-OracleJava-6.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Desktop 6", "product_id": "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686" }, "product_reference": "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "relates_to_product_reference": "6Client-OracleJava-6.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Desktop 6", "product_id": "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64" }, "product_reference": "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "relates_to_product_reference": "6Client-OracleJava-6.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Desktop 6", "product_id": "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686" }, "product_reference": "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "relates_to_product_reference": "6Client-OracleJava-6.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Desktop 6", "product_id": "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64" }, "product_reference": "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "relates_to_product_reference": "6Client-OracleJava-6.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Desktop 6", "product_id": "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686" }, "product_reference": "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "relates_to_product_reference": "6Client-OracleJava-6.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Desktop 6", "product_id": "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64" }, "product_reference": "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "relates_to_product_reference": "6Client-OracleJava-6.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux HPC Node 6", "product_id": "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686" }, "product_reference": "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "relates_to_product_reference": "6ComputeNode-OracleJava-6.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux HPC Node 6", "product_id": "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64" }, "product_reference": "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-OracleJava-6.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux HPC Node 6", "product_id": "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686" }, "product_reference": "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "relates_to_product_reference": "6ComputeNode-OracleJava-6.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux HPC Node 6", "product_id": "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64" }, "product_reference": "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-OracleJava-6.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux HPC Node 6", "product_id": "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686" }, "product_reference": "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "relates_to_product_reference": "6ComputeNode-OracleJava-6.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux HPC Node 6", "product_id": "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64" }, "product_reference": "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-OracleJava-6.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux HPC Node 6", "product_id": "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686" }, "product_reference": "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "relates_to_product_reference": "6ComputeNode-OracleJava-6.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux HPC Node 6", "product_id": "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64" }, "product_reference": "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-OracleJava-6.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux HPC Node 6", "product_id": "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686" }, "product_reference": "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "relates_to_product_reference": "6ComputeNode-OracleJava-6.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux HPC Node 6", "product_id": "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64" }, "product_reference": "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-OracleJava-6.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux HPC Node 6", "product_id": "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686" }, "product_reference": "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "relates_to_product_reference": "6ComputeNode-OracleJava-6.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux HPC Node 6", "product_id": "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64" }, "product_reference": "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-OracleJava-6.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Server 6", "product_id": "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686" }, "product_reference": "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "relates_to_product_reference": "6Server-OracleJava-6.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Server 6", "product_id": "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64" }, "product_reference": "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "relates_to_product_reference": "6Server-OracleJava-6.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Server 6", "product_id": "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686" }, "product_reference": "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "relates_to_product_reference": "6Server-OracleJava-6.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Server 6", "product_id": "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64" }, "product_reference": "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "relates_to_product_reference": "6Server-OracleJava-6.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Server 6", "product_id": "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686" }, "product_reference": "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "relates_to_product_reference": "6Server-OracleJava-6.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Server 6", "product_id": "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64" }, "product_reference": "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "relates_to_product_reference": "6Server-OracleJava-6.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Server 6", "product_id": "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686" }, "product_reference": "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "relates_to_product_reference": "6Server-OracleJava-6.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Server 6", "product_id": "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64" }, "product_reference": "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "relates_to_product_reference": "6Server-OracleJava-6.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Server 6", "product_id": "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686" }, "product_reference": "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "relates_to_product_reference": "6Server-OracleJava-6.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Server 6", "product_id": "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64" }, "product_reference": "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "relates_to_product_reference": "6Server-OracleJava-6.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Server 6", "product_id": "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686" }, "product_reference": "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "relates_to_product_reference": "6Server-OracleJava-6.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Server 6", "product_id": "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64" }, "product_reference": "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "relates_to_product_reference": "6Server-OracleJava-6.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Workstation 6", "product_id": "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686" }, "product_reference": "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "relates_to_product_reference": "6Workstation-OracleJava-6.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Workstation 6", "product_id": "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64" }, "product_reference": "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "relates_to_product_reference": "6Workstation-OracleJava-6.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Workstation 6", "product_id": "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686" }, "product_reference": "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "relates_to_product_reference": "6Workstation-OracleJava-6.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Workstation 6", "product_id": "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64" }, "product_reference": "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "relates_to_product_reference": "6Workstation-OracleJava-6.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Workstation 6", "product_id": "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686" }, "product_reference": "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "relates_to_product_reference": "6Workstation-OracleJava-6.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Workstation 6", "product_id": "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64" }, "product_reference": "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "relates_to_product_reference": "6Workstation-OracleJava-6.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Workstation 6", "product_id": "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686" }, "product_reference": "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "relates_to_product_reference": "6Workstation-OracleJava-6.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Workstation 6", "product_id": "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64" }, "product_reference": "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "relates_to_product_reference": "6Workstation-OracleJava-6.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Workstation 6", "product_id": "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686" }, "product_reference": "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "relates_to_product_reference": "6Workstation-OracleJava-6.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Workstation 6", "product_id": "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64" }, "product_reference": "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "relates_to_product_reference": "6Workstation-OracleJava-6.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Workstation 6", "product_id": "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686" }, "product_reference": "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "relates_to_product_reference": "6Workstation-OracleJava-6.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Workstation 6", "product_id": "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64" }, "product_reference": "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "relates_to_product_reference": "6Workstation-OracleJava-6.10.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-2940", "discovery_date": "2018-07-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1602146" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (Libraries)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-2940" }, { "category": "external", "summary": "RHBZ#1602146", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1602146" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-2940", "url": "https://www.cve.org/CVERecord?id=CVE-2018-2940" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-2940", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-2940" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA" } ], "release_date": "2018-07-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-07-24T21:09:42+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Oracle Java must be restarted for this update to take effect.", "product_ids": [ "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2256" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (Libraries)" }, { "cve": "CVE-2018-2941", "discovery_date": "2018-07-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1602143" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: JavaFX). Supported versions that are affected are Java SE: 7u181, 8u172 and 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 7u191, 8u181, and 10.0.2 (JavaFX)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-2941" }, { "category": "external", "summary": "RHBZ#1602143", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1602143" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-2941", "url": "https://www.cve.org/CVERecord?id=CVE-2018-2941" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-2941", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-2941" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA" } ], "release_date": "2018-07-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-07-24T21:09:42+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Oracle Java must be restarted for this update to take effect.", "product_ids": [ "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2256" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 7u191, 8u181, and 10.0.2 (JavaFX)" }, { "cve": "CVE-2018-2952", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2018-07-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1600925" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171; JRockit: R28.3.18. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-2952" }, { "category": "external", "summary": "RHBZ#1600925", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1600925" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-2952", "url": "https://www.cve.org/CVERecord?id=CVE-2018-2952" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-2952", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-2952" } ], "release_date": "2018-07-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-07-24T21:09:42+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Oracle Java must be restarted for this update to take effect.", "product_ids": [ "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2256" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547)" }, { "cve": "CVE-2018-2964", "discovery_date": "2018-07-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1602142" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 8u172 and 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 8u181 and 10.0.2 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-2964" }, { "category": "external", "summary": "RHBZ#1602142", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1602142" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-2964", "url": "https://www.cve.org/CVERecord?id=CVE-2018-2964" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-2964", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-2964" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA" } ], "release_date": "2018-07-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-07-24T21:09:42+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Oracle Java must be restarted for this update to take effect.", "product_ids": [ "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2256" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 8u181 and 10.0.2 (Deployment)" }, { "cve": "CVE-2018-2973", "discovery_date": "2018-07-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1602145" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SSL/TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (JSSE)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-2973" }, { "category": "external", "summary": "RHBZ#1602145", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1602145" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-2973", "url": "https://www.cve.org/CVERecord?id=CVE-2018-2973" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-2973", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-2973" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA" } ], "release_date": "2018-07-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-07-24T21:09:42+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Oracle Java must be restarted for this update to take effect.", "product_ids": [ "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2256" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686", "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (JSSE)" } ] }
rhsa-2018_2253
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for java-1.8.0-oracle is now available for Oracle Java for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Oracle Java SE version 8 includes the Oracle Java Runtime Environment and the Oracle Java Software Development Kit.\n\nThis update upgrades Oracle Java SE 8 to version 8 Update 181.\n\nSecurity Fix(es):\n\n* Oracle JDK: unspecified vulnerability fixed in 7u191, 8u181, and 10.0.2 (JavaFX) (CVE-2018-2941)\n\n* Oracle JDK: unspecified vulnerability fixed in 8u181 and 10.0.2 (Deployment) (CVE-2018-2964)\n\n* Oracle JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (Libraries) (CVE-2018-2940)\n\n* OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547) (CVE-2018-2952)\n\n* Oracle JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (JSSE) (CVE-2018-2973)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:2253", "url": "https://access.redhat.com/errata/RHSA-2018:2253" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "1600925", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1600925" }, { "category": "external", "summary": "1602142", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1602142" }, { "category": "external", "summary": "1602143", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1602143" }, { "category": "external", "summary": "1602145", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1602145" }, { "category": "external", "summary": "1602146", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1602146" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2253.json" } ], "title": "Red Hat Security Advisory: java-1.8.0-oracle security update", "tracking": { "current_release_date": "2024-11-15T02:11:43+00:00", "generator": { "date": "2024-11-15T02:11:43+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2018:2253", "initial_release_date": "2018-07-24T21:13:37+00:00", "revision_history": [ { "date": "2018-07-24T21:13:37+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-07-24T21:13:37+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T02:11:43+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Oracle Java for Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Oracle Java for Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-OracleJava-7.5.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_oracle_java:7" } } }, { "category": "product_name", "name": "Oracle Java for Red Hat Enterprise Linux Compute Node (v. 7)", "product": { "name": "Oracle Java for Red Hat Enterprise Linux Compute Node (v. 7)", "product_id": "7ComputeNode-OracleJava-7.5.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_oracle_java:7" } } }, { "category": "product_name", "name": "Oracle Java for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Oracle Java for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-OracleJava-7.5.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_oracle_java:7" } } }, { "category": "product_name", "name": "Oracle Java for Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Oracle Java for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-OracleJava-7.5.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_oracle_java:7" } } } ], "category": "product_family", "name": "Oracle Java for Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "product": { "name": "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "product_id": "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-oracle-jdbc@1.8.0.181-1jpp.2.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "product": { "name": "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "product_id": "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-oracle-src@1.8.0.181-1jpp.2.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "product": { "name": "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "product_id": "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-oracle-plugin@1.8.0.181-1jpp.2.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "product": { "name": "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "product_id": "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-oracle-javafx@1.8.0.181-1jpp.2.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "product": { "name": "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "product_id": "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-oracle-devel@1.8.0.181-1jpp.2.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "product": { "name": "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "product_id": "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-oracle@1.8.0.181-1jpp.2.el7?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64" }, "product_reference": "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "relates_to_product_reference": "7Client-OracleJava-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64" }, "product_reference": "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "relates_to_product_reference": "7Client-OracleJava-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64" }, "product_reference": "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "relates_to_product_reference": "7Client-OracleJava-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64" }, "product_reference": "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "relates_to_product_reference": "7Client-OracleJava-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64" }, "product_reference": "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "relates_to_product_reference": "7Client-OracleJava-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64" }, "product_reference": "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "relates_to_product_reference": "7Client-OracleJava-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Compute Node (v. 7)", "product_id": "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64" }, "product_reference": "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-OracleJava-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Compute Node (v. 7)", "product_id": "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64" }, "product_reference": "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-OracleJava-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Compute Node (v. 7)", "product_id": "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64" }, "product_reference": "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-OracleJava-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Compute Node (v. 7)", "product_id": "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64" }, "product_reference": "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-OracleJava-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Compute Node (v. 7)", "product_id": "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64" }, "product_reference": "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-OracleJava-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Compute Node (v. 7)", "product_id": "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64" }, "product_reference": "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-OracleJava-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64" }, "product_reference": "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "relates_to_product_reference": "7Server-OracleJava-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64" }, "product_reference": "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "relates_to_product_reference": "7Server-OracleJava-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64" }, "product_reference": "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "relates_to_product_reference": "7Server-OracleJava-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64" }, "product_reference": "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "relates_to_product_reference": "7Server-OracleJava-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64" }, "product_reference": "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "relates_to_product_reference": "7Server-OracleJava-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64" }, "product_reference": "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "relates_to_product_reference": "7Server-OracleJava-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64" }, "product_reference": "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "relates_to_product_reference": "7Workstation-OracleJava-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64" }, "product_reference": "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "relates_to_product_reference": "7Workstation-OracleJava-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64" }, "product_reference": "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "relates_to_product_reference": "7Workstation-OracleJava-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64" }, "product_reference": "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "relates_to_product_reference": "7Workstation-OracleJava-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64" }, "product_reference": "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "relates_to_product_reference": "7Workstation-OracleJava-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64" }, "product_reference": "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "relates_to_product_reference": "7Workstation-OracleJava-7.5.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-2940", "discovery_date": "2018-07-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1602146" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (Libraries)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-2940" }, { "category": "external", "summary": "RHBZ#1602146", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1602146" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-2940", "url": "https://www.cve.org/CVERecord?id=CVE-2018-2940" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-2940", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-2940" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA" } ], "release_date": "2018-07-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-07-24T21:13:37+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Oracle Java must be restarted for this update to take effect.", "product_ids": [ "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2253" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (Libraries)" }, { "cve": "CVE-2018-2941", "discovery_date": "2018-07-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1602143" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: JavaFX). Supported versions that are affected are Java SE: 7u181, 8u172 and 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 7u191, 8u181, and 10.0.2 (JavaFX)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-2941" }, { "category": "external", "summary": "RHBZ#1602143", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1602143" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-2941", "url": "https://www.cve.org/CVERecord?id=CVE-2018-2941" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-2941", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-2941" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA" } ], "release_date": "2018-07-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-07-24T21:13:37+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Oracle Java must be restarted for this update to take effect.", "product_ids": [ "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2253" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 7u191, 8u181, and 10.0.2 (JavaFX)" }, { "cve": "CVE-2018-2952", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2018-07-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1600925" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171; JRockit: R28.3.18. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-2952" }, { "category": "external", "summary": "RHBZ#1600925", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1600925" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-2952", "url": "https://www.cve.org/CVERecord?id=CVE-2018-2952" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-2952", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-2952" } ], "release_date": "2018-07-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-07-24T21:13:37+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Oracle Java must be restarted for this update to take effect.", "product_ids": [ "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2253" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547)" }, { "cve": "CVE-2018-2964", "discovery_date": "2018-07-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1602142" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 8u172 and 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 8u181 and 10.0.2 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-2964" }, { "category": "external", "summary": "RHBZ#1602142", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1602142" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-2964", "url": "https://www.cve.org/CVERecord?id=CVE-2018-2964" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-2964", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-2964" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA" } ], "release_date": "2018-07-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-07-24T21:13:37+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Oracle Java must be restarted for this update to take effect.", "product_ids": [ "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2253" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 8u181 and 10.0.2 (Deployment)" }, { "cve": "CVE-2018-2973", "discovery_date": "2018-07-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1602145" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SSL/TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (JSSE)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-2973" }, { "category": "external", "summary": "RHBZ#1602145", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1602145" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-2973", "url": "https://www.cve.org/CVERecord?id=CVE-2018-2973" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-2973", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-2973" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA" } ], "release_date": "2018-07-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-07-24T21:13:37+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Oracle Java must be restarted for this update to take effect.", "product_ids": [ "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2253" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64", "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (JSSE)" } ] }
gsd-2018-2964
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2018-2964", "description": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 8u172 and 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "id": "GSD-2018-2964", "references": [ "https://www.suse.com/security/cve/CVE-2018-2964.html", "https://access.redhat.com/errata/RHSA-2018:2256", "https://access.redhat.com/errata/RHSA-2018:2253" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2018-2964" ], "details": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 8u172 and 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "id": "GSD-2018-2964", "modified": "2023-12-13T01:22:31.638747Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert_us@oracle.com", "ID": "CVE-2018-2964", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Java", "version": { "version_data": [ { "version_affected": "=", "version_value": "Java SE: 8u172" }, { "version_affected": "=", "version_value": "10.0.1" } ] } } ] }, "vendor_name": "Oracle Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 8u172 and 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE." } ] } ] }, "references": { "reference_data": [ { "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "name": "104780", "refsource": "BID", "url": "http://www.securityfocus.com/bid/104780" }, { "name": "https://security.netapp.com/advisory/ntap-20180726-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20180726-0001/" }, { "name": "RHSA-2018:2256", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2256" }, { "name": "RHSA-2018:2253", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2253" }, { "name": "1041302", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1041302" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:oracle:jre:10.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:10.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.8.0:update172:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jre:1.8.0:update172:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*", "cpe_name": [], "versionStartIncluding": "9.7", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*", "cpe_name": [], "versionStartIncluding": "9.7", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:sap:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*", "cpe_name": [], "versionStartIncluding": "9.7", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:9.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "11.70.1", "versionStartIncluding": "11.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert_us@oracle.com", "ID": "CVE-2018-2964" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 8u172 and 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", "refsource": "CONFIRM", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "name": "104780", "refsource": "BID", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104780" }, { "name": "RHSA-2018:2256", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2256" }, { "name": "RHSA-2018:2253", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2253" }, { "name": "https://security.netapp.com/advisory/ntap-20180726-0001/", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20180726-0001/" }, { "name": "1041302", "refsource": "SECTRACK", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041302" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": true }, "baseMetricV3": { "cvssV3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 6.0 } }, "lastModifiedDate": "2022-06-27T17:35Z", "publishedDate": "2018-07-18T13:29Z" } } }
wid-sec-w-2023-1308
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Die Java Platform, Standard Edition (SE) ist eine Sammlung von Java-APIs (JDK) und der Java Laufzeit Umgebung (JRE).\r\nJava Standard Edition (SE) Embedded ist die Laufzeitumgebung f\u00fcr die Java-Plattform des US-Unternehmens Oracle Corporation f\u00fcr Embedded Systems.\r\nOracle JRockit JVM ist eine leistungsf\u00e4hige Java Virtual Machine, die in Oracle Fusion Middleware enthalten ist.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Oracle Java SE, Oracle Java SE Embedded und Oracle JRockit ausnutzen, um die Verf\u00fcgbarkeit, Vertraulichkeit und Integrit\u00e4t zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux\n- Windows\n- Appliance", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-1308 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2018/wid-sec-w-2023-1308.json" }, { "category": "self", "summary": "WID-SEC-2023-1308 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1308" }, { "category": "external", "summary": "F5 Security Advisory K000134793 vom 2023-05-25", "url": "https://my.f5.com/manage/s/article/K000134793" }, { "category": "external", "summary": "Oracle Critical Patch Update Advisory - Juli 2018 -Java SE vom 2018-07-17", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-2241 vom 2018-07-23", "url": "http://linux.oracle.com/errata/ELSA-2018-2241.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:2242 vom 2018-07-23", "url": "http://rhn.redhat.com/errata/RHSA-2018-2242.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:2241 vom 2018-07-23", "url": "http://rhn.redhat.com/errata/RHSA-2018-2241.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-2242 vom 2018-07-24", "url": "http://linux.oracle.com/errata/ELSA-2018-2242.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:2256 vom 2018-07-24", "url": "https://access.redhat.com/errata/RHSA-2018:2256" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:2255 vom 2018-07-24", "url": "https://access.redhat.com/errata/RHSA-2018:2255" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:2254 vom 2018-07-24", "url": "https://access.redhat.com/errata/RHSA-2018:2254" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:2253 vom 2018-07-24", "url": "https://access.redhat.com/errata/RHSA-2018:2253" }, { "category": "external", "summary": "NetApp Security Advisory NTAP-20180726-0001 vom 2018-07-27", "url": "https://security.netapp.com/advisory/ntap-20180726-0001/" }, { "category": "external", "summary": "Hitachi Security Information hitachi-sec-2018-122 vom 2018-07.26", "url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/hitachi-sec-2018-122/index.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:2083-1 vom 2018-07-28", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182083-1.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-2286 vom 2018-07-31", "url": "http://linux.oracle.com/errata/ELSA-2018-2286.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-2283 vom 2018-07-31", "url": "http://linux.oracle.com/errata/ELSA-2018-2283.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:2286 vom 2018-07-30", "url": "http://rhn.redhat.com/errata/RHSA-2018-2286.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:2283 vom 2018-07-30", "url": "http://rhn.redhat.com/errata/RHSA-2018-2283.html" }, { "category": "external", "summary": "CentOS-announce CESA-2018:2242 vom 2018-07-25", "url": "https://lists.centos.org/pipermail/centos-announce/2018-July/022972.html" }, { "category": "external", "summary": "CentOS Security Advisory CESA-2018:2283 vom 2018-08-09", "url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2018-2283-Moderate-CentOS-6-java-1-7-0-openjdk-Security-Update-tp4645217.html" }, { "category": "external", "summary": "CentOS Security Advisory CESA-2018:2286 vom 2018-08-09", "url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2018-2286-Moderate-CentOS-7-java-1-7-0-openjdk-Security-Update-tp4645220.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-4268 vom 2018-08-11", "url": "https://www.debian.org/security/2018/dsa-4268" }, { "category": "external", "summary": "Ubuntu Security Notice USN-3734-1 vom 2018-08-10", "url": "http://www.ubuntu.com/usn/usn-3734-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-3735-1 vom 2018-08-10", "url": "http://www.ubuntu.com/usn/usn-3735-1" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:2568 vom 2018-08-27", "url": "http://rhn.redhat.com/errata/RHSA-2018-2568.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:2569 vom 2018-08-27", "url": "http://rhn.redhat.com/errata/RHSA-2018-2569.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:2576 vom 2018-08-28", "url": "http://rhn.redhat.com/errata/RHSA-2018-2576.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:2575 vom 2018-08-28", "url": "http://rhn.redhat.com/errata/RHSA-2018-2575.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:2839-1 vom 2018-09-24", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182839-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:3045-1 vom 2018-10-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183045-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:3064-1 vom 2018-10-08", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183064-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:3082-1 vom 2018-10-09", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183082-1.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:3007 vom 2018-10-25", "url": "https://access.redhat.com/errata/RHSA-2018:3007" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:3008 vom 2018-10-25", "url": "https://access.redhat.com/errata/RHSA-2018:3008" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2019:0049-1 vom 2019-01-10", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20190049-1/" }, { "category": "external", "summary": "Dell/EMC Knowledge Base Article: 000529947", "url": "https://support.emc.com/kb/529947" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2019:0049-2 vom 2019-04-13", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20190049-2.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:3064-3 vom 2019-04-28", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20183064-3.html" }, { "category": "external", "summary": "Avaya Security Advisory ASA-2018-241 vom 2019-12-20", "url": "https://downloads.avaya.com/css/P8/documents/101053536" } ], "source_lang": "en-US", "title": "Oracle Java SE: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-05-25T22:00:00.000+00:00", "generator": { "date": "2024-08-15T17:51:27.993+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2023-1308", "initial_release_date": "2018-07-17T22:00:00.000+00:00", "revision_history": [ { "date": "2018-07-17T22:00:00.000+00:00", "number": "1", "summary": "Initial Release" }, { "date": "2018-07-17T22:00:00.000+00:00", "number": "2", "summary": "Version nicht vorhanden" }, { "date": "2018-07-17T22:00:00.000+00:00", "number": "3", "summary": "Version nicht vorhanden" }, { "date": "2018-07-23T22:00:00.000+00:00", "number": "4", "summary": "New remediations available" }, { "date": "2018-07-24T22:00:00.000+00:00", "number": "5", "summary": "New remediations available" }, { "date": "2018-07-24T22:00:00.000+00:00", "number": "6", "summary": "New remediations available" }, { "date": "2018-07-24T22:00:00.000+00:00", "number": "7", "summary": "Version nicht vorhanden" }, { "date": "2018-07-25T22:00:00.000+00:00", "number": "8", "summary": "New remediations available" }, { "date": "2018-07-26T22:00:00.000+00:00", "number": "9", "summary": "New remediations available" }, { "date": "2018-07-26T22:00:00.000+00:00", "number": "10", "summary": "Version nicht vorhanden" }, { "date": "2018-07-26T22:00:00.000+00:00", "number": "11", "summary": "Version nicht vorhanden" }, { "date": "2018-07-29T22:00:00.000+00:00", "number": "12", "summary": "New remediations available" }, { "date": "2018-07-30T22:00:00.000+00:00", "number": "13", "summary": "New remediations available" }, { "date": "2018-07-30T22:00:00.000+00:00", "number": "14", "summary": "New remediations available" }, { "date": "2018-08-09T22:00:00.000+00:00", "number": "15", "summary": "New remediations available" }, { "date": "2018-08-12T22:00:00.000+00:00", "number": "16", "summary": "New remediations available" }, { "date": "2018-08-12T22:00:00.000+00:00", "number": "17", "summary": "New remediations available" }, { "date": "2018-08-12T22:00:00.000+00:00", "number": "18", "summary": "Version nicht vorhanden" }, { "date": "2018-08-12T22:00:00.000+00:00", "number": "19", "summary": "Version nicht vorhanden" }, { "date": "2018-08-27T22:00:00.000+00:00", "number": "20", "summary": "New remediations available" }, { "date": "2018-08-28T22:00:00.000+00:00", "number": "21", "summary": "New remediations available" }, { "date": "2018-09-24T22:00:00.000+00:00", "number": "22", "summary": "New remediations available" }, { "date": "2018-10-07T22:00:00.000+00:00", "number": "23", "summary": "New remediations available" }, { "date": "2018-10-08T22:00:00.000+00:00", "number": "24", "summary": "New remediations available" }, { "date": "2018-10-09T22:00:00.000+00:00", "number": "25", "summary": "New remediations available" }, { "date": "2018-10-24T22:00:00.000+00:00", "number": "26", "summary": "New remediations available" }, { "date": "2018-11-22T23:00:00.000+00:00", "number": "27", "summary": "reference added" }, { "date": "2019-01-09T23:00:00.000+00:00", "number": "28", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2019-01-30T23:00:00.000+00:00", "number": "29", "summary": "Neue Updates von EMC aufgenommen" }, { "date": "2019-04-14T22:00:00.000+00:00", "number": "30", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2019-04-28T22:00:00.000+00:00", "number": "31", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2019-12-22T23:00:00.000+00:00", "number": "32", "summary": "Neue Updates von AVAYA aufgenommen" }, { "date": "2023-05-25T22:00:00.000+00:00", "number": "33", "summary": "Neue Updates von F5 aufgenommen" } ], "status": "final", "version": "33" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Avaya Aura Experience Portal", "product": { "name": "Avaya Aura Experience Portal", "product_id": "T015519", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_experience_portal:-" } } }, { "category": "product_name", "name": "Avaya Aura Session Manager", "product": { "name": "Avaya Aura Session Manager", "product_id": "T015127", "product_identification_helper": { "cpe": "cpe:/a:avaya:session_manager:-" } } }, { "category": "product_name", "name": "Avaya Aura System Manager", "product": { "name": "Avaya Aura System Manager", "product_id": "T015518", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_system_manager:-" } } } ], "category": "vendor", "name": "Avaya" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "EMC VNX2", "product": { "name": "EMC VNX2", "product_id": "T004667", "product_identification_helper": { "cpe": "cpe:/h:emc:vnx:-" } } } ], "category": "vendor", "name": "EMC" }, { "branches": [ { "category": "product_name", "name": "F5 BIG-IP", "product": { "name": "F5 BIG-IP", "product_id": "T001663", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip:-" } } } ], "category": "vendor", "name": "F5" }, { "branches": [ { "category": "product_name", "name": "Hitachi Command Suite", "product": { "name": "Hitachi Command Suite", "product_id": "T010951", "product_identification_helper": { "cpe": "cpe:/a:hitachi:command_suite:-" } } } ], "category": "vendor", "name": "Hitachi" }, { "branches": [ { "category": "product_name", "name": "NetApp OnCommand Unified Manager", "product": { "name": "NetApp OnCommand Unified Manager", "product_id": "T009408", "product_identification_helper": { "cpe": "cpe:/a:netapp:oncommand_unified_manager:-" } } } ], "category": "vendor", "name": "NetApp" }, { "branches": [ { "category": "product_name", "name": "Open Source CentOS", "product": { "name": "Open Source CentOS", "product_id": "1727", "product_identification_helper": { "cpe": "cpe:/o:centos:centos:-" } } } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Java SE", "product": { "name": "Oracle Java SE", "product_id": "T009724", "product_identification_helper": { "cpe": "cpe:/a:oracle:java_se:-" } } }, { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-2938", "notes": [ { "category": "description", "text": "In Oracle Java SE, Oracle Java SE Embedded und Oracle JRockit existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verf\u00fcgbarkeit, Vertraulichkeit und Integrit\u00e4t gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung bzw. keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T015519", "T015518", "T009408", "67646", "T004667", "T009724", "T010951", "T015127", "T004914", "2951", "T002207", "T000126", "T001663", "1727" ] }, "release_date": "2018-07-17T22:00:00.000+00:00", "title": "CVE-2018-2938" }, { "cve": "CVE-2018-2940", "notes": [ { "category": "description", "text": "In Oracle Java SE, Oracle Java SE Embedded und Oracle JRockit existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verf\u00fcgbarkeit, Vertraulichkeit und Integrit\u00e4t gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung bzw. keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T015519", "T015518", "T009408", "67646", "T004667", "T009724", "T010951", "T015127", "T004914", "2951", "T002207", "T000126", "T001663", "1727" ] }, "release_date": "2018-07-17T22:00:00.000+00:00", "title": "CVE-2018-2940" }, { "cve": "CVE-2018-2941", "notes": [ { "category": "description", "text": "In Oracle Java SE, Oracle Java SE Embedded und Oracle JRockit existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verf\u00fcgbarkeit, Vertraulichkeit und Integrit\u00e4t gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung bzw. keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T015519", "T015518", "T009408", "67646", "T004667", "T009724", "T010951", "T015127", "T004914", "2951", "T002207", "T000126", "T001663", "1727" ] }, "release_date": "2018-07-17T22:00:00.000+00:00", "title": "CVE-2018-2941" }, { "cve": "CVE-2018-2942", "notes": [ { "category": "description", "text": "In Oracle Java SE, Oracle Java SE Embedded und Oracle JRockit existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verf\u00fcgbarkeit, Vertraulichkeit und Integrit\u00e4t gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung bzw. keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T015519", "T015518", "T009408", "67646", "T004667", "T009724", "T010951", "T015127", "T004914", "2951", "T002207", "T000126", "T001663", "1727" ] }, "release_date": "2018-07-17T22:00:00.000+00:00", "title": "CVE-2018-2942" }, { "cve": "CVE-2018-2952", "notes": [ { "category": "description", "text": "In Oracle Java SE, Oracle Java SE Embedded und Oracle JRockit existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verf\u00fcgbarkeit, Vertraulichkeit und Integrit\u00e4t gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung bzw. keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T015519", "T015518", "T009408", "67646", "T004667", "T009724", "T010951", "T015127", "T004914", "2951", "T002207", "T000126", "T001663", "1727" ] }, "release_date": "2018-07-17T22:00:00.000+00:00", "title": "CVE-2018-2952" }, { "cve": "CVE-2018-2964", "notes": [ { "category": "description", "text": "In Oracle Java SE, Oracle Java SE Embedded und Oracle JRockit existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verf\u00fcgbarkeit, Vertraulichkeit und Integrit\u00e4t gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung bzw. keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T015519", "T015518", "T009408", "67646", "T004667", "T009724", "T010951", "T015127", "T004914", "2951", "T002207", "T000126", "T001663", "1727" ] }, "release_date": "2018-07-17T22:00:00.000+00:00", "title": "CVE-2018-2964" }, { "cve": "CVE-2018-2972", "notes": [ { "category": "description", "text": "In Oracle Java SE, Oracle Java SE Embedded und Oracle JRockit existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verf\u00fcgbarkeit, Vertraulichkeit und Integrit\u00e4t gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung bzw. keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T015519", "T015518", "T009408", "67646", "T004667", "T009724", "T010951", "T015127", "T004914", "2951", "T002207", "T000126", "T001663", "1727" ] }, "release_date": "2018-07-17T22:00:00.000+00:00", "title": "CVE-2018-2972" }, { "cve": "CVE-2018-2973", "notes": [ { "category": "description", "text": "In Oracle Java SE, Oracle Java SE Embedded und Oracle JRockit existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verf\u00fcgbarkeit, Vertraulichkeit und Integrit\u00e4t gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung bzw. keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T015519", "T015518", "T009408", "67646", "T004667", "T009724", "T010951", "T015127", "T004914", "2951", "T002207", "T000126", "T001663", "1727" ] }, "release_date": "2018-07-17T22:00:00.000+00:00", "title": "CVE-2018-2973" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.