Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2018-2964 (GCVE-0-2018-2964)
Vulnerability from cvelistv5 – Published: 2018-07-18 13:00 – Updated: 2024-10-02 20:13- Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE.
| URL | Tags |
|---|---|
| http://www.oracle.com/technetwork/security-adviso… | x_refsource_CONFIRM |
| http://www.securityfocus.com/bid/104780 | vdb-entryx_refsource_BID |
| https://security.netapp.com/advisory/ntap-2018072… | x_refsource_CONFIRM |
| https://access.redhat.com/errata/RHSA-2018:2256 | vendor-advisoryx_refsource_REDHAT |
| https://access.redhat.com/errata/RHSA-2018:2253 | vendor-advisoryx_refsource_REDHAT |
| http://www.securitytracker.com/id/1041302 | vdb-entryx_refsource_SECTRACK |
| Vendor | Product | Version | |
|---|---|---|---|
| Oracle Corporation | Java |
Affected:
Java SE: 8u172
Affected: 10.0.1 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T04:36:39.462Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
},
{
"name": "104780",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/104780"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20180726-0001/"
},
{
"name": "RHSA-2018:2256",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2256"
},
{
"name": "RHSA-2018:2253",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2253"
},
{
"name": "1041302",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1041302"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2018-2964",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-02T18:16:39.452138Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-02T20:13:21.084Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Java",
"vendor": "Oracle Corporation",
"versions": [
{
"status": "affected",
"version": "Java SE: 8u172"
},
{
"status": "affected",
"version": "10.0.1"
}
]
}
],
"datePublic": "2018-03-27T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 8u172 and 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H)."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE.",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-07-27T09:57:01.000Z",
"orgId": "43595867-4340-4103-b7a2-9a5208d29a85",
"shortName": "oracle"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
},
{
"name": "104780",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/104780"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://security.netapp.com/advisory/ntap-20180726-0001/"
},
{
"name": "RHSA-2018:2256",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2256"
},
{
"name": "RHSA-2018:2253",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2253"
},
{
"name": "1041302",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1041302"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2018-2964",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Java",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "Java SE: 8u172"
},
{
"version_affected": "=",
"version_value": "10.0.1"
}
]
}
}
]
},
"vendor_name": "Oracle Corporation"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 8u172 and 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H)."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE."
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
},
{
"name": "104780",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/104780"
},
{
"name": "https://security.netapp.com/advisory/ntap-20180726-0001/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20180726-0001/"
},
{
"name": "RHSA-2018:2256",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2256"
},
{
"name": "RHSA-2018:2253",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2253"
},
{
"name": "1041302",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041302"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85",
"assignerShortName": "oracle",
"cveId": "CVE-2018-2964",
"datePublished": "2018-07-18T13:00:00.000Z",
"dateReserved": "2017-12-15T00:00:00.000Z",
"dateUpdated": "2024-10-02T20:13:21.084Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2018-2964",
"date": "2026-05-20",
"epss": "0.00439",
"percentile": "0.63331"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jdk:1.8.0:update172:*:*:*:*:*:*\", \"matchCriteriaId\": \"C6BB93E3-3983-40FD-A119-11334C707755\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jdk:10.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3C103C17-E4A9-40A2-959B-29547D706DFC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jre:1.8.0:update172:*:*:*:*:*:*\", \"matchCriteriaId\": \"788BDADB-6F4E-4DFD-BE2E-2D9B3AFBA5CA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jre:10.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1EBB11AD-EA72-4C15-945E-D335A1BF0979\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*\", \"matchCriteriaId\": \"3A756737-1CC4-42C2-A4DF-E1C893B4E2D5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*\", \"matchCriteriaId\": \"B55E8D50-99B4-47EC-86F9-699B67D473CE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C2089EE-5D7F-47EC-8EA5-0F69790564C4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11.0\", \"versionEndIncluding\": \"11.70.1\", \"matchCriteriaId\": \"73F81EC3-4AB0-4CD7-B845-267C5974DE98\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0D9CC59D-6182-4B5E-96B5-226FCD343916\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F1BE6C1F-2565-4E97-92AA-16563E5660A5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C18CA4B5-28FD-4199-B1F0-B1E59E920370\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5735E553-9731-4AAC-BCFF-989377F817B3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FFE0A9D2-9A49-4BF6-BC6F-8249162D8334\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*\", \"matchCriteriaId\": \"25BBBC1A-228F-45A6-AE95-DB915EDF84BD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:sap:*:*\", \"matchCriteriaId\": \"C57D2B31-9696-4451-BA04-D093FFCF7E39\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E94F7F59-1785-493F-91A7-5F5EA5E87E4D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*\", \"versionStartIncluding\": \"9.7\", \"matchCriteriaId\": \"9DBEE506-E864-4FC6-B5D3-7E134438592C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"9.7\", \"matchCriteriaId\": \"5E73AC99-34AC-4D4B-A946-34F33AAEC4A1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:9.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FF20DCD2-7BDD-4BD1-8B29-9216E881EA8D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*\", \"versionStartIncluding\": \"9.7\", \"matchCriteriaId\": \"D4BE7695-11DB-4F04-A469-91A29A83B358\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 8u172 and 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).\"}, {\"lang\": \"es\", \"value\": \"Vulnerabilidad en el componente Java SE de Oracle Java SE (subcomponente: Deployment). Las versiones compatibles que se han visto afectadas son JavaSE: 8u172 y 10.0.1. Una vulnerabilidad dif\\u00edcilmente explotable permite que un atacante sin autenticar que tenga acceso a red por m\\u00faltiples protocolos comprometa la seguridad de Java SE. Para que los ataques tengan \\u00e9xito, se necesita la participaci\\u00f3n de otra persona diferente del atacante y, aunque la vulnerabilidad est\\u00e1 presente en Java SE, los ataques podr\\u00edan afectar seriamente a productos adicionales. Los ataques exitosos a esta vulnerabilidad pueden resultar en la toma de control de Java SE. Nota: esta vulnerabilidad se aplica a implementaciones Java, normalmente en clientes que ejecutan aplicaciones Java Web Start en sandbox o applets Java en sandbox que cargan y ejecutan c\\u00f3digo que no es de confianza (por ejemplo, c\\u00f3digo proveniente de internet) y que conf\\u00edan en la sandbox de aislado Java para protegerse. Esta vulnerabilidad no se aplica a implementaciones Java, normalmente en servidores, que solo cargan y ejecutan c\\u00f3digo de confianza (por ejemplo, c\\u00f3digo instalado por un administrador). CVSS 3.0 Base Score 8.3 (impactos en la confidencialidad, integridad y disponibilidad). Vector CVSS: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).\"}]",
"id": "CVE-2018-2964",
"lastModified": "2024-11-21T04:04:51.237",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H\", \"baseScore\": 8.3, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.6, \"impactScore\": 6.0}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:H/Au:N/C:P/I:P/A:P\", \"baseScore\": 5.1, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"HIGH\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 4.9, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
"published": "2018-07-18T13:29:03.507",
"references": "[{\"url\": \"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html\", \"source\": \"secalert_us@oracle.com\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/104780\", \"source\": \"secalert_us@oracle.com\", \"tags\": [\"Broken Link\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id/1041302\", \"source\": \"secalert_us@oracle.com\", \"tags\": [\"Broken Link\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2018:2253\", \"source\": \"secalert_us@oracle.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2018:2256\", \"source\": \"secalert_us@oracle.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20180726-0001/\", \"source\": \"secalert_us@oracle.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/104780\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id/1041302\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2018:2253\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2018:2256\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20180726-0001/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]",
"sourceIdentifier": "secalert_us@oracle.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2018-2964\",\"sourceIdentifier\":\"secalert_us@oracle.com\",\"published\":\"2018-07-18T13:29:03.507\",\"lastModified\":\"2024-11-21T04:04:51.237\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 8u172 and 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad en el componente Java SE de Oracle Java SE (subcomponente: Deployment). Las versiones compatibles que se han visto afectadas son JavaSE: 8u172 y 10.0.1. Una vulnerabilidad dif\u00edcilmente explotable permite que un atacante sin autenticar que tenga acceso a red por m\u00faltiples protocolos comprometa la seguridad de Java SE. Para que los ataques tengan \u00e9xito, se necesita la participaci\u00f3n de otra persona diferente del atacante y, aunque la vulnerabilidad est\u00e1 presente en Java SE, los ataques podr\u00edan afectar seriamente a productos adicionales. Los ataques exitosos a esta vulnerabilidad pueden resultar en la toma de control de Java SE. Nota: esta vulnerabilidad se aplica a implementaciones Java, normalmente en clientes que ejecutan aplicaciones Java Web Start en sandbox o applets Java en sandbox que cargan y ejecutan c\u00f3digo que no es de confianza (por ejemplo, c\u00f3digo proveniente de internet) y que conf\u00edan en la sandbox de aislado Java para protegerse. Esta vulnerabilidad no se aplica a implementaciones Java, normalmente en servidores, que solo cargan y ejecutan c\u00f3digo de confianza (por ejemplo, c\u00f3digo instalado por un administrador). CVSS 3.0 Base Score 8.3 (impactos en la confidencialidad, integridad y disponibilidad). Vector CVSS: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H\",\"baseScore\":8.3,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.6,\"impactScore\":6.0}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:H/Au:N/C:P/I:P/A:P\",\"baseScore\":5.1,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"HIGH\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":4.9,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.8.0:update172:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6BB93E3-3983-40FD-A119-11334C707755\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:10.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C103C17-E4A9-40A2-959B-29547D706DFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.8.0:update172:*:*:*:*:*:*\",\"matchCriteriaId\":\"788BDADB-6F4E-4DFD-BE2E-2D9B3AFBA5CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:10.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EBB11AD-EA72-4C15-945E-D335A1BF0979\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*\",\"matchCriteriaId\":\"3A756737-1CC4-42C2-A4DF-E1C893B4E2D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*\",\"matchCriteriaId\":\"B55E8D50-99B4-47EC-86F9-699B67D473CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C2089EE-5D7F-47EC-8EA5-0F69790564C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.0\",\"versionEndIncluding\":\"11.70.1\",\"matchCriteriaId\":\"73F81EC3-4AB0-4CD7-B845-267C5974DE98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D9CC59D-6182-4B5E-96B5-226FCD343916\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1BE6C1F-2565-4E97-92AA-16563E5660A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C18CA4B5-28FD-4199-B1F0-B1E59E920370\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5735E553-9731-4AAC-BCFF-989377F817B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FFE0A9D2-9A49-4BF6-BC6F-8249162D8334\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*\",\"matchCriteriaId\":\"25BBBC1A-228F-45A6-AE95-DB915EDF84BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:sap:*:*\",\"matchCriteriaId\":\"C57D2B31-9696-4451-BA04-D093FFCF7E39\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E94F7F59-1785-493F-91A7-5F5EA5E87E4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*\",\"versionStartIncluding\":\"9.7\",\"matchCriteriaId\":\"9DBEE506-E864-4FC6-B5D3-7E134438592C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"9.7\",\"matchCriteriaId\":\"5E73AC99-34AC-4D4B-A946-34F33AAEC4A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:9.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF20DCD2-7BDD-4BD1-8B29-9216E881EA8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*\",\"versionStartIncluding\":\"9.7\",\"matchCriteriaId\":\"D4BE7695-11DB-4F04-A469-91A29A83B358\"}]}]}],\"references\":[{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/104780\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1041302\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2253\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2256\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20180726-0001/\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/104780\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1041302\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2253\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2256\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20180726-0001/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://www.securityfocus.com/bid/104780\", \"name\": \"104780\", \"tags\": [\"vdb-entry\", \"x_refsource_BID\", \"x_transferred\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20180726-0001/\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2018:2256\", \"name\": \"RHSA-2018:2256\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2018:2253\", \"name\": \"RHSA-2018:2253\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"http://www.securitytracker.com/id/1041302\", \"name\": \"1041302\", \"tags\": [\"vdb-entry\", \"x_refsource_SECTRACK\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-05T04:36:39.462Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2018-2964\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-10-02T18:16:39.452138Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-10-02T18:17:20.984Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"Oracle Corporation\", \"product\": \"Java\", \"versions\": [{\"status\": \"affected\", \"version\": \"Java SE: 8u172\"}, {\"status\": \"affected\", \"version\": \"10.0.1\"}]}], \"datePublic\": \"2018-03-27T00:00:00.000Z\", \"references\": [{\"url\": \"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://www.securityfocus.com/bid/104780\", \"name\": \"104780\", \"tags\": [\"vdb-entry\", \"x_refsource_BID\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20180726-0001/\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2018:2256\", \"name\": \"RHSA-2018:2256\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2018:2253\", \"name\": \"RHSA-2018:2253\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"http://www.securitytracker.com/id/1041302\", \"name\": \"1041302\", \"tags\": [\"vdb-entry\", \"x_refsource_SECTRACK\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 8u172 and 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE.\"}]}], \"providerMetadata\": {\"orgId\": \"43595867-4340-4103-b7a2-9a5208d29a85\", \"shortName\": \"oracle\", \"dateUpdated\": \"2018-07-27T09:57:01.000Z\"}, \"x_legacyV4Record\": {\"affects\": {\"vendor\": {\"vendor_data\": [{\"product\": {\"product_data\": [{\"version\": {\"version_data\": [{\"version_value\": \"Java SE: 8u172\", \"version_affected\": \"=\"}, {\"version_value\": \"10.0.1\", \"version_affected\": \"=\"}]}, \"product_name\": \"Java\"}]}, \"vendor_name\": \"Oracle Corporation\"}]}}, \"data_type\": \"CVE\", \"references\": {\"reference_data\": [{\"url\": \"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html\", \"name\": \"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://www.securityfocus.com/bid/104780\", \"name\": \"104780\", \"refsource\": \"BID\"}, {\"url\": \"https://security.netapp.com/advisory/ntap-20180726-0001/\", \"name\": \"https://security.netapp.com/advisory/ntap-20180726-0001/\", \"refsource\": \"CONFIRM\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2018:2256\", \"name\": \"RHSA-2018:2256\", \"refsource\": \"REDHAT\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2018:2253\", \"name\": \"RHSA-2018:2253\", \"refsource\": \"REDHAT\"}, {\"url\": \"http://www.securitytracker.com/id/1041302\", \"name\": \"1041302\", \"refsource\": \"SECTRACK\"}]}, \"data_format\": \"MITRE\", \"description\": {\"description_data\": [{\"lang\": \"eng\", \"value\": \"Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 8u172 and 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).\"}]}, \"problemtype\": {\"problemtype_data\": [{\"description\": [{\"lang\": \"eng\", \"value\": \"Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE.\"}]}]}, \"data_version\": \"4.0\", \"CVE_data_meta\": {\"ID\": \"CVE-2018-2964\", \"STATE\": \"PUBLIC\", \"ASSIGNER\": \"secalert_us@oracle.com\"}}}}",
"cveMetadata": "{\"cveId\": \"CVE-2018-2964\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-10-02T20:13:21.084Z\", \"dateReserved\": \"2017-12-15T00:00:00.000Z\", \"assignerOrgId\": \"43595867-4340-4103-b7a2-9a5208d29a85\", \"datePublished\": \"2018-07-18T13:00:00.000Z\", \"assignerShortName\": \"oracle\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
CERTFR-2018-AVI-348
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Oracle Java SE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Java SE Embedded versions 8u171",
"product": {
"name": "Java SE",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Java SE versions 6u191",
"product": {
"name": "Java SE",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "JRockit versions R28.3.18",
"product": {
"name": "Java SE",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Java SE versions 8u172",
"product": {
"name": "Java SE",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Java SE versions 10.0.1",
"product": {
"name": "Java SE",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Java SE versions 7u181",
"product": {
"name": "Java SE",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-2938",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2938"
},
{
"name": "CVE-2018-2973",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2973"
},
{
"name": "CVE-2018-2941",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2941"
},
{
"name": "CVE-2018-2940",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2940"
},
{
"name": "CVE-2018-2942",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2942"
},
{
"name": "CVE-2018-2952",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2952"
},
{
"name": "CVE-2018-2964",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2964"
},
{
"name": "CVE-2018-2972",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2972"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-348",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-07-18T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle Java SE.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net un d\u00e9ni de service.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle Java SE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle cpujul2018-4258247 du 17 juillet 2018",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle cpujul2018verbose-4258253 du 17 juillet 2018",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018verbose-4258253.html#JAVA"
}
]
}
CERTFR-2018-AVI-589
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | N/A | IBM Cúram Social Program Management (SPM) versions 6.1.x antérieures à 6.1.1.6 iFix2 | ||
| IBM | N/A | IBM Security SiteProtector System versions 3.0.0.x antérieures à 3.0.0.20 | ||
| IBM | N/A | IBM Cúram Social Program Management (SPM) versions 7.x antérieures à 7.0.4.0 iFix1 | ||
| IBM | N/A | VRA - Vyatta 5600 | ||
| IBM | WebSphere | IBM Java SDK dans IBM WebSphere Application Server versions 1.0.0.0 à 1.0.0.7 et 2.2.0.0 à 2.2.6.0 | ||
| IBM | N/A | IBM Cúram Social Program Management (SPM) versions 6.2.x antérieures à 6.2.0.6 iFix2 | ||
| IBM | QRadar | IBM QRadar Network Security versions 5.5.x antérieures à 5.5.0.1 | ||
| IBM | N/A | IBM DataPower Gateway versions 7.6.x antérieures à 7.6.0.3 | ||
| IBM | N/A | IBM Social Program Management Design System versions antérieures à 1.4.0 | ||
| IBM | N/A | IBM Cúram Social Program Management (SPM) versions 6.0.5.x antérieures à 6.0.5.10 iFix4 | ||
| IBM | N/A | IBM DataPower Gateway versions 7.1.x antérieures à 7.1.0.20 | ||
| IBM | N/A | IBM DataPower Gateway versions 7.5.2.x antérieures à 7.2.10 | ||
| IBM | N/A | IBM Cúram Social Program Management (SPM) versions 7.0.x antérieures à 7.0.1.3 | ||
| IBM | N/A | IBM Lotus Protector for Mail Security version 2.8.1.0 | ||
| IBM | N/A | IBM DataPower Gateway versions 7.2.x antérieures à 7.2.0.17 | ||
| IBM | QRadar | IBM QRadar Network Security versions 5.4.x antérieures à 5.4.0.6 | ||
| IBM | N/A | IBM DataPower Gateway versions 7.5.1.x antérieures à 7.1.10 | ||
| IBM | N/A | IBM Security SiteProtector System versions 3.1.1.x antérieures à 3.1.1.17 | ||
| IBM | N/A | IBM DataPower Gateway versions 7.5.0.x antérieures à 7.5.0.11 | ||
| IBM | WebSphere | WebSphere Application Server versions antérieures à 9.0.0.10 | ||
| IBM | N/A | IBM Voice Gateway versions antérieures à 1.0.0.7a | ||
| IBM | N/A | IBM Lotus Protector for Mail Security version 2.8.3.0 |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM C\u00faram Social Program Management (SPM) versions 6.1.x ant\u00e9rieures \u00e0 6.1.1.6 iFix2",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Security SiteProtector System versions 3.0.0.x ant\u00e9rieures \u00e0 3.0.0.20",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM C\u00faram Social Program Management (SPM) versions 7.x ant\u00e9rieures \u00e0 7.0.4.0 iFix1",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "VRA - Vyatta 5600",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Java SDK dans IBM WebSphere Application Server versions 1.0.0.0 \u00e0 1.0.0.7 et 2.2.0.0 \u00e0 2.2.6.0",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM C\u00faram Social Program Management (SPM) versions 6.2.x ant\u00e9rieures \u00e0 6.2.0.6 iFix2",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar Network Security versions 5.5.x ant\u00e9rieures \u00e0 5.5.0.1",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM DataPower Gateway versions 7.6.x ant\u00e9rieures \u00e0 7.6.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Social Program Management Design System versions ant\u00e9rieures \u00e0 1.4.0",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM C\u00faram Social Program Management (SPM) versions 6.0.5.x ant\u00e9rieures \u00e0 6.0.5.10 iFix4",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM DataPower Gateway versions 7.1.x ant\u00e9rieures \u00e0 7.1.0.20",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM DataPower Gateway versions 7.5.2.x ant\u00e9rieures \u00e0 7.2.10",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM C\u00faram Social Program Management (SPM) versions 7.0.x ant\u00e9rieures \u00e0 7.0.1.3",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Lotus Protector for Mail Security version 2.8.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM DataPower Gateway versions 7.2.x ant\u00e9rieures \u00e0 7.2.0.17",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar Network Security versions 5.4.x ant\u00e9rieures \u00e0 5.4.0.6",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM DataPower Gateway versions 7.5.1.x ant\u00e9rieures \u00e0 7.1.10",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Security SiteProtector System versions 3.1.1.x ant\u00e9rieures \u00e0 3.1.1.17",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM DataPower Gateway versions 7.5.0.x ant\u00e9rieures \u00e0 7.5.0.11",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "WebSphere Application Server versions ant\u00e9rieures \u00e0 9.0.0.10",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Voice Gateway versions ant\u00e9rieures \u00e0 1.0.0.7a",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Lotus Protector for Mail Security version 2.8.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-16058",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16058"
},
{
"name": "CVE-2018-10873",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10873"
},
{
"name": "CVE-2018-3721",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3721"
},
{
"name": "CVE-2018-16396",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16396"
},
{
"name": "CVE-2018-0737",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0737"
},
{
"name": "CVE-2018-10933",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10933"
},
{
"name": "CVE-2018-16658",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16658"
},
{
"name": "CVE-2018-0739",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0739"
},
{
"name": "CVE-2018-10902",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10902"
},
{
"name": "CVE-2018-15594",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15594"
},
{
"name": "CVE-2018-16151",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16151"
},
{
"name": "CVE-2018-8039",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8039"
},
{
"name": "CVE-2018-1656",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1656"
},
{
"name": "CVE-2018-1671",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1671"
},
{
"name": "CVE-2018-2973",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2973"
},
{
"name": "CVE-2018-6554",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6554"
},
{
"name": "CVE-2018-1652",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1652"
},
{
"name": "CVE-2018-16842",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16842"
},
{
"name": "CVE-2018-17182",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17182"
},
{
"name": "CVE-2018-2964",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2964"
},
{
"name": "CVE-2018-3139",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3139"
},
{
"name": "CVE-2018-15572",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15572"
},
{
"name": "CVE-2018-14609",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14609"
},
{
"name": "CVE-2018-3620",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3620"
},
{
"name": "CVE-2018-14618",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14618"
},
{
"name": "CVE-2018-16395",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16395"
},
{
"name": "CVE-2017-3732",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3732"
},
{
"name": "CVE-2017-3736",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3736"
},
{
"name": "CVE-2018-16056",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16056"
},
{
"name": "CVE-2018-3180",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3180"
},
{
"name": "CVE-2018-1900",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1900"
},
{
"name": "CVE-2018-14617",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14617"
},
{
"name": "CVE-2017-3735",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3735"
},
{
"name": "CVE-2018-16839",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16839"
},
{
"name": "CVE-2018-14633",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14633"
},
{
"name": "CVE-2018-14678",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14678"
},
{
"name": "CVE-2018-13099",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13099"
},
{
"name": "CVE-2018-0732",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0732"
},
{
"name": "CVE-2018-9516",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9516"
},
{
"name": "CVE-2018-9363",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9363"
},
{
"name": "CVE-2018-16152",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16152"
},
{
"name": "CVE-2018-10938",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10938"
},
{
"name": "CVE-2018-14734",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14734"
},
{
"name": "CVE-2016-0705",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0705"
},
{
"name": "CVE-2018-1957",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1957"
},
{
"name": "CVE-2018-1654",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1654"
},
{
"name": "CVE-2018-0495",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0495"
},
{
"name": "CVE-2018-18065",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18065"
},
{
"name": "CVE-2018-8013",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8013"
},
{
"name": "CVE-2018-12539",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12539"
},
{
"name": "CVE-2018-16276",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16276"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-589",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-12-10T00:00:00.000000"
},
{
"description": "Ajout de deux bulletins de s\u00e9curit\u00e9 IBM Lotus Protector",
"revision_date": "2018-12-11T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire, un d\u00e9ni de service \u00e0 distance et un\ncontournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM ibm10732880 du 07 d\u00e9cembre 2018",
"url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10732880"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM ibm10739019 du 05 d\u00e9cembre 2018",
"url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10739019"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM ibm10744291 du 05 d\u00e9cembre 2018",
"url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10744291"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM ibm10744157 du 07 d\u00e9cembre 2018",
"url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10744157"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM ibm10739035 du 06 d\u00e9cembre 2018",
"url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10739035"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM ibm10744557 du 07 d\u00e9cembre 2018",
"url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10744557"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM ibm10739985 du 06 d\u00e9cembre 2018",
"url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10739985"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM ibm10740799 du 06 d\u00e9cembre 2018",
"url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10740799"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM ibm10743847 du 06 d\u00e9cembre 2018",
"url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10743847"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM ibm10736137 du 06 d\u00e9cembre 2018",
"url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10736137"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM ibm10742369 du 06 d\u00e9cembre 2018",
"url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10742369"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM ibm10739027 du 06 d\u00e9cembre 2018",
"url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10739027"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM ibm10744247 du 06 d\u00e9cembre 2018",
"url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10744247"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM ibm10744553 du 06 d\u00e9cembre 2018",
"url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10744553"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM ibm10740789 du 07 d\u00e9cembre 2018",
"url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10740789"
}
]
}
CERTFR-2018-AVI-348
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Oracle Java SE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Java SE Embedded versions 8u171",
"product": {
"name": "Java SE",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Java SE versions 6u191",
"product": {
"name": "Java SE",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "JRockit versions R28.3.18",
"product": {
"name": "Java SE",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Java SE versions 8u172",
"product": {
"name": "Java SE",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Java SE versions 10.0.1",
"product": {
"name": "Java SE",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Java SE versions 7u181",
"product": {
"name": "Java SE",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-2938",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2938"
},
{
"name": "CVE-2018-2973",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2973"
},
{
"name": "CVE-2018-2941",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2941"
},
{
"name": "CVE-2018-2940",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2940"
},
{
"name": "CVE-2018-2942",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2942"
},
{
"name": "CVE-2018-2952",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2952"
},
{
"name": "CVE-2018-2964",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2964"
},
{
"name": "CVE-2018-2972",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2972"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-348",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-07-18T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle Java SE.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net un d\u00e9ni de service.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle Java SE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle cpujul2018-4258247 du 17 juillet 2018",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle cpujul2018verbose-4258253 du 17 juillet 2018",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018verbose-4258253.html#JAVA"
}
]
}
CERTFR-2018-AVI-589
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | N/A | IBM Cúram Social Program Management (SPM) versions 6.1.x antérieures à 6.1.1.6 iFix2 | ||
| IBM | N/A | IBM Security SiteProtector System versions 3.0.0.x antérieures à 3.0.0.20 | ||
| IBM | N/A | IBM Cúram Social Program Management (SPM) versions 7.x antérieures à 7.0.4.0 iFix1 | ||
| IBM | N/A | VRA - Vyatta 5600 | ||
| IBM | WebSphere | IBM Java SDK dans IBM WebSphere Application Server versions 1.0.0.0 à 1.0.0.7 et 2.2.0.0 à 2.2.6.0 | ||
| IBM | N/A | IBM Cúram Social Program Management (SPM) versions 6.2.x antérieures à 6.2.0.6 iFix2 | ||
| IBM | QRadar | IBM QRadar Network Security versions 5.5.x antérieures à 5.5.0.1 | ||
| IBM | N/A | IBM DataPower Gateway versions 7.6.x antérieures à 7.6.0.3 | ||
| IBM | N/A | IBM Social Program Management Design System versions antérieures à 1.4.0 | ||
| IBM | N/A | IBM Cúram Social Program Management (SPM) versions 6.0.5.x antérieures à 6.0.5.10 iFix4 | ||
| IBM | N/A | IBM DataPower Gateway versions 7.1.x antérieures à 7.1.0.20 | ||
| IBM | N/A | IBM DataPower Gateway versions 7.5.2.x antérieures à 7.2.10 | ||
| IBM | N/A | IBM Cúram Social Program Management (SPM) versions 7.0.x antérieures à 7.0.1.3 | ||
| IBM | N/A | IBM Lotus Protector for Mail Security version 2.8.1.0 | ||
| IBM | N/A | IBM DataPower Gateway versions 7.2.x antérieures à 7.2.0.17 | ||
| IBM | QRadar | IBM QRadar Network Security versions 5.4.x antérieures à 5.4.0.6 | ||
| IBM | N/A | IBM DataPower Gateway versions 7.5.1.x antérieures à 7.1.10 | ||
| IBM | N/A | IBM Security SiteProtector System versions 3.1.1.x antérieures à 3.1.1.17 | ||
| IBM | N/A | IBM DataPower Gateway versions 7.5.0.x antérieures à 7.5.0.11 | ||
| IBM | WebSphere | WebSphere Application Server versions antérieures à 9.0.0.10 | ||
| IBM | N/A | IBM Voice Gateway versions antérieures à 1.0.0.7a | ||
| IBM | N/A | IBM Lotus Protector for Mail Security version 2.8.3.0 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM C\u00faram Social Program Management (SPM) versions 6.1.x ant\u00e9rieures \u00e0 6.1.1.6 iFix2",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Security SiteProtector System versions 3.0.0.x ant\u00e9rieures \u00e0 3.0.0.20",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM C\u00faram Social Program Management (SPM) versions 7.x ant\u00e9rieures \u00e0 7.0.4.0 iFix1",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "VRA - Vyatta 5600",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Java SDK dans IBM WebSphere Application Server versions 1.0.0.0 \u00e0 1.0.0.7 et 2.2.0.0 \u00e0 2.2.6.0",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM C\u00faram Social Program Management (SPM) versions 6.2.x ant\u00e9rieures \u00e0 6.2.0.6 iFix2",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar Network Security versions 5.5.x ant\u00e9rieures \u00e0 5.5.0.1",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM DataPower Gateway versions 7.6.x ant\u00e9rieures \u00e0 7.6.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Social Program Management Design System versions ant\u00e9rieures \u00e0 1.4.0",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM C\u00faram Social Program Management (SPM) versions 6.0.5.x ant\u00e9rieures \u00e0 6.0.5.10 iFix4",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM DataPower Gateway versions 7.1.x ant\u00e9rieures \u00e0 7.1.0.20",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM DataPower Gateway versions 7.5.2.x ant\u00e9rieures \u00e0 7.2.10",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM C\u00faram Social Program Management (SPM) versions 7.0.x ant\u00e9rieures \u00e0 7.0.1.3",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Lotus Protector for Mail Security version 2.8.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM DataPower Gateway versions 7.2.x ant\u00e9rieures \u00e0 7.2.0.17",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar Network Security versions 5.4.x ant\u00e9rieures \u00e0 5.4.0.6",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM DataPower Gateway versions 7.5.1.x ant\u00e9rieures \u00e0 7.1.10",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Security SiteProtector System versions 3.1.1.x ant\u00e9rieures \u00e0 3.1.1.17",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM DataPower Gateway versions 7.5.0.x ant\u00e9rieures \u00e0 7.5.0.11",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "WebSphere Application Server versions ant\u00e9rieures \u00e0 9.0.0.10",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Voice Gateway versions ant\u00e9rieures \u00e0 1.0.0.7a",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Lotus Protector for Mail Security version 2.8.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-16058",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16058"
},
{
"name": "CVE-2018-10873",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10873"
},
{
"name": "CVE-2018-3721",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3721"
},
{
"name": "CVE-2018-16396",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16396"
},
{
"name": "CVE-2018-0737",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0737"
},
{
"name": "CVE-2018-10933",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10933"
},
{
"name": "CVE-2018-16658",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16658"
},
{
"name": "CVE-2018-0739",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0739"
},
{
"name": "CVE-2018-10902",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10902"
},
{
"name": "CVE-2018-15594",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15594"
},
{
"name": "CVE-2018-16151",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16151"
},
{
"name": "CVE-2018-8039",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8039"
},
{
"name": "CVE-2018-1656",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1656"
},
{
"name": "CVE-2018-1671",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1671"
},
{
"name": "CVE-2018-2973",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2973"
},
{
"name": "CVE-2018-6554",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6554"
},
{
"name": "CVE-2018-1652",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1652"
},
{
"name": "CVE-2018-16842",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16842"
},
{
"name": "CVE-2018-17182",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17182"
},
{
"name": "CVE-2018-2964",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2964"
},
{
"name": "CVE-2018-3139",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3139"
},
{
"name": "CVE-2018-15572",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15572"
},
{
"name": "CVE-2018-14609",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14609"
},
{
"name": "CVE-2018-3620",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3620"
},
{
"name": "CVE-2018-14618",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14618"
},
{
"name": "CVE-2018-16395",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16395"
},
{
"name": "CVE-2017-3732",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3732"
},
{
"name": "CVE-2017-3736",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3736"
},
{
"name": "CVE-2018-16056",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16056"
},
{
"name": "CVE-2018-3180",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3180"
},
{
"name": "CVE-2018-1900",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1900"
},
{
"name": "CVE-2018-14617",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14617"
},
{
"name": "CVE-2017-3735",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3735"
},
{
"name": "CVE-2018-16839",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16839"
},
{
"name": "CVE-2018-14633",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14633"
},
{
"name": "CVE-2018-14678",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14678"
},
{
"name": "CVE-2018-13099",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13099"
},
{
"name": "CVE-2018-0732",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0732"
},
{
"name": "CVE-2018-9516",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9516"
},
{
"name": "CVE-2018-9363",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9363"
},
{
"name": "CVE-2018-16152",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16152"
},
{
"name": "CVE-2018-10938",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10938"
},
{
"name": "CVE-2018-14734",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14734"
},
{
"name": "CVE-2016-0705",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0705"
},
{
"name": "CVE-2018-1957",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1957"
},
{
"name": "CVE-2018-1654",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1654"
},
{
"name": "CVE-2018-0495",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0495"
},
{
"name": "CVE-2018-18065",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18065"
},
{
"name": "CVE-2018-8013",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8013"
},
{
"name": "CVE-2018-12539",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12539"
},
{
"name": "CVE-2018-16276",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16276"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-589",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-12-10T00:00:00.000000"
},
{
"description": "Ajout de deux bulletins de s\u00e9curit\u00e9 IBM Lotus Protector",
"revision_date": "2018-12-11T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire, un d\u00e9ni de service \u00e0 distance et un\ncontournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM ibm10732880 du 07 d\u00e9cembre 2018",
"url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10732880"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM ibm10739019 du 05 d\u00e9cembre 2018",
"url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10739019"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM ibm10744291 du 05 d\u00e9cembre 2018",
"url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10744291"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM ibm10744157 du 07 d\u00e9cembre 2018",
"url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10744157"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM ibm10739035 du 06 d\u00e9cembre 2018",
"url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10739035"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM ibm10744557 du 07 d\u00e9cembre 2018",
"url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10744557"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM ibm10739985 du 06 d\u00e9cembre 2018",
"url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10739985"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM ibm10740799 du 06 d\u00e9cembre 2018",
"url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10740799"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM ibm10743847 du 06 d\u00e9cembre 2018",
"url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10743847"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM ibm10736137 du 06 d\u00e9cembre 2018",
"url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10736137"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM ibm10742369 du 06 d\u00e9cembre 2018",
"url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10742369"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM ibm10739027 du 06 d\u00e9cembre 2018",
"url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10739027"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM ibm10744247 du 06 d\u00e9cembre 2018",
"url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10744247"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM ibm10744553 du 06 d\u00e9cembre 2018",
"url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10744553"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM ibm10740789 du 07 d\u00e9cembre 2018",
"url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10740789"
}
]
}
CNVD-2018-13570
Vulnerability from cnvd - Published: 2018-07-20厂商已发布漏洞修复程序,请及时关注更新: http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
| Name | ['Oracle Java SE 8u172', 'Oracle Java SE 10.0.1'] |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2018-2964"
}
},
"description": "Java SE\u662fJava\u5e73\u53f0\u6807\u51c6\u7248\u7684\u7b80\u79f0,\u7528\u4e8e\u5f00\u53d1\u548c\u90e8\u7f72\u684c\u9762\u3001\u670d\u52a1\u5668\u4ee5\u53ca\u5d4c\u5165\u8bbe\u5907\u548c\u5b9e\u65f6\u73af\u5883\u4e2d\u7684Java\u5e94\u7528\u7a0b\u5e8f\u3002\r\n\r\nOracle Java SE 8u172\u300110.0.1\u4e2d\u7684Deployment\u7ec4\u4ef6\u5b58\u5728\u672a\u660e\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5f71\u54cd\u673a\u5bc6\u6027\u3001\u5b8c\u6574\u6027\u53ca\u53ef\u7528\u6027\u3002",
"discovererName": "Zhong Zhaochen",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttp://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2018-13570",
"openTime": "2018-07-20",
"patchDescription": "Java SE\u662fJava\u5e73\u53f0\u6807\u51c6\u7248\u7684\u7b80\u79f0,\u7528\u4e8e\u5f00\u53d1\u548c\u90e8\u7f72\u684c\u9762\u3001\u670d\u52a1\u5668\u4ee5\u53ca\u5d4c\u5165\u8bbe\u5907\u548c\u5b9e\u65f6\u73af\u5883\u4e2d\u7684Java\u5e94\u7528\u7a0b\u5e8f\u3002\r\n\r\nOracle Java SE 8u172\u300110.0.1\u4e2d\u7684Deployment\u7ec4\u4ef6\u5b58\u5728\u672a\u660e\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5f71\u54cd\u673a\u5bc6\u6027\u3001\u5b8c\u6574\u6027\u53ca\u53ef\u7528\u6027\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Oracle Java SE\u5b58\u5728\u672a\u660e\u6f0f\u6d1e\uff08CNVD-2018-13570\uff09\u7684\u8865\u4e01",
"products": {
"product": [
"Oracle Java SE 8u172",
"Oracle Java SE 10.0.1"
]
},
"referenceLink": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"serverity": "\u9ad8",
"submitTime": "2018-07-18",
"title": "Oracle Java SE\u5b58\u5728\u672a\u660e\u6f0f\u6d1e\uff08CNVD-2018-13570\uff09"
}
FKIE_CVE-2018-2964
Vulnerability from fkie_nvd - Published: 2018-07-18 13:29 - Updated: 2024-11-21 04:04| URL | Tags | ||
|---|---|---|---|
| secalert_us@oracle.com | http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html | Patch, Vendor Advisory | |
| secalert_us@oracle.com | http://www.securityfocus.com/bid/104780 | Broken Link, Third Party Advisory, VDB Entry | |
| secalert_us@oracle.com | http://www.securitytracker.com/id/1041302 | Broken Link, Third Party Advisory, VDB Entry | |
| secalert_us@oracle.com | https://access.redhat.com/errata/RHSA-2018:2253 | Third Party Advisory | |
| secalert_us@oracle.com | https://access.redhat.com/errata/RHSA-2018:2256 | Third Party Advisory | |
| secalert_us@oracle.com | https://security.netapp.com/advisory/ntap-20180726-0001/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html | Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/104780 | Broken Link, Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1041302 | Broken Link, Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2253 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2256 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20180726-0001/ | Third Party Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| oracle | jdk | 1.8.0 | |
| oracle | jdk | 10.0.1 | |
| oracle | jre | 1.8.0 | |
| oracle | jre | 10.0.1 | |
| netapp | active_iq_unified_manager | - | |
| netapp | active_iq_unified_manager | - | |
| netapp | cloud_backup | - | |
| netapp | e-series_santricity_os_controller | * | |
| netapp | e-series_santricity_storage_manager | - | |
| netapp | oncommand_insight | - | |
| netapp | oncommand_unified_manager | - | |
| netapp | oncommand_workflow_automation | - | |
| netapp | plug-in_for_symantec_netbackup | - | |
| netapp | snapmanager | - | |
| netapp | snapmanager | - | |
| netapp | steelstore_cloud_integrated_storage | - | |
| netapp | storage_replication_adapter_for_clustered_data_ontap | * | |
| netapp | vasa_provider_for_clustered_data_ontap | * | |
| netapp | vasa_provider_for_clustered_data_ontap | 9.6 | |
| netapp | virtual_storage_console | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:oracle:jdk:1.8.0:update172:*:*:*:*:*:*",
"matchCriteriaId": "C6BB93E3-3983-40FD-A119-11334C707755",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:10.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3C103C17-E4A9-40A2-959B-29547D706DFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.8.0:update172:*:*:*:*:*:*",
"matchCriteriaId": "788BDADB-6F4E-4DFD-BE2E-2D9B3AFBA5CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:10.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1EBB11AD-EA72-4C15-945E-D335A1BF0979",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
"matchCriteriaId": "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
"matchCriteriaId": "B55E8D50-99B4-47EC-86F9-699B67D473CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5C2089EE-5D7F-47EC-8EA5-0F69790564C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
"matchCriteriaId": "73F81EC3-4AB0-4CD7-B845-267C5974DE98",
"versionEndIncluding": "11.70.1",
"versionStartIncluding": "11.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D9CC59D-6182-4B5E-96B5-226FCD343916",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F1BE6C1F-2565-4E97-92AA-16563E5660A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C18CA4B5-28FD-4199-B1F0-B1E59E920370",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5735E553-9731-4AAC-BCFF-989377F817B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FFE0A9D2-9A49-4BF6-BC6F-8249162D8334",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*",
"matchCriteriaId": "25BBBC1A-228F-45A6-AE95-DB915EDF84BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:sap:*:*",
"matchCriteriaId": "C57D2B31-9696-4451-BA04-D093FFCF7E39",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E94F7F59-1785-493F-91A7-5F5EA5E87E4D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*",
"matchCriteriaId": "9DBEE506-E864-4FC6-B5D3-7E134438592C",
"versionStartIncluding": "9.7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5E73AC99-34AC-4D4B-A946-34F33AAEC4A1",
"versionStartIncluding": "9.7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:9.6:*:*:*:*:*:*:*",
"matchCriteriaId": "FF20DCD2-7BDD-4BD1-8B29-9216E881EA8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*",
"matchCriteriaId": "D4BE7695-11DB-4F04-A469-91A29A83B358",
"versionStartIncluding": "9.7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 8u172 and 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H)."
},
{
"lang": "es",
"value": "Vulnerabilidad en el componente Java SE de Oracle Java SE (subcomponente: Deployment). Las versiones compatibles que se han visto afectadas son JavaSE: 8u172 y 10.0.1. Una vulnerabilidad dif\u00edcilmente explotable permite que un atacante sin autenticar que tenga acceso a red por m\u00faltiples protocolos comprometa la seguridad de Java SE. Para que los ataques tengan \u00e9xito, se necesita la participaci\u00f3n de otra persona diferente del atacante y, aunque la vulnerabilidad est\u00e1 presente en Java SE, los ataques podr\u00edan afectar seriamente a productos adicionales. Los ataques exitosos a esta vulnerabilidad pueden resultar en la toma de control de Java SE. Nota: esta vulnerabilidad se aplica a implementaciones Java, normalmente en clientes que ejecutan aplicaciones Java Web Start en sandbox o applets Java en sandbox que cargan y ejecutan c\u00f3digo que no es de confianza (por ejemplo, c\u00f3digo proveniente de internet) y que conf\u00edan en la sandbox de aislado Java para protegerse. Esta vulnerabilidad no se aplica a implementaciones Java, normalmente en servidores, que solo cargan y ejecutan c\u00f3digo de confianza (por ejemplo, c\u00f3digo instalado por un administrador). CVSS 3.0 Base Score 8.3 (impactos en la confidencialidad, integridad y disponibilidad). Vector CVSS: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H)."
}
],
"id": "CVE-2018-2964",
"lastModified": "2024-11-21T04:04:51.237",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 4.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.6,
"impactScore": 6.0,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2018-07-18T13:29:03.507",
"references": [
{
"source": "secalert_us@oracle.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
},
{
"source": "secalert_us@oracle.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/104780"
},
{
"source": "secalert_us@oracle.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1041302"
},
{
"source": "secalert_us@oracle.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2253"
},
{
"source": "secalert_us@oracle.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2256"
},
{
"source": "secalert_us@oracle.com",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20180726-0001/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/104780"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1041302"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2253"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2256"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20180726-0001/"
}
],
"sourceIdentifier": "secalert_us@oracle.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-2Q7M-M9FQ-G952
Vulnerability from github – Published: 2022-05-13 01:17 – Updated: 2022-05-13 01:17Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 8u172 and 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
{
"affected": [],
"aliases": [
"CVE-2018-2964"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2018-07-18T13:29:00Z",
"severity": "HIGH"
},
"details": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 8u172 and 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).",
"id": "GHSA-2q7m-m9fq-g952",
"modified": "2022-05-13T01:17:20Z",
"published": "2022-05-13T01:17:20Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-2964"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2018:2253"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2018:2256"
},
{
"type": "WEB",
"url": "https://security.netapp.com/advisory/ntap-20180726-0001"
},
{
"type": "WEB",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/104780"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id/1041302"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
GSD-2018-2964
Vulnerability from gsd - Updated: 2023-12-13 01:22{
"GSD": {
"alias": "CVE-2018-2964",
"description": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 8u172 and 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).",
"id": "GSD-2018-2964",
"references": [
"https://www.suse.com/security/cve/CVE-2018-2964.html",
"https://access.redhat.com/errata/RHSA-2018:2256",
"https://access.redhat.com/errata/RHSA-2018:2253"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2018-2964"
],
"details": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 8u172 and 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).",
"id": "GSD-2018-2964",
"modified": "2023-12-13T01:22:31.638747Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2018-2964",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Java",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "Java SE: 8u172"
},
{
"version_affected": "=",
"version_value": "10.0.1"
}
]
}
}
]
},
"vendor_name": "Oracle Corporation"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 8u172 and 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H)."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE."
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
},
{
"name": "104780",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/104780"
},
{
"name": "https://security.netapp.com/advisory/ntap-20180726-0001/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20180726-0001/"
},
{
"name": "RHSA-2018:2256",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2256"
},
{
"name": "RHSA-2018:2253",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2253"
},
{
"name": "1041302",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041302"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:10.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:10.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.8.0:update172:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.8.0:update172:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*",
"cpe_name": [],
"versionStartIncluding": "9.7",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*",
"cpe_name": [],
"versionStartIncluding": "9.7",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:sap:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionStartIncluding": "9.7",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:9.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "11.70.1",
"versionStartIncluding": "11.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2018-2964"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 8u172 and 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H)."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"refsource": "CONFIRM",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
},
{
"name": "104780",
"refsource": "BID",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/104780"
},
{
"name": "RHSA-2018:2256",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2256"
},
{
"name": "RHSA-2018:2253",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2253"
},
{
"name": "https://security.netapp.com/advisory/ntap-20180726-0001/",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20180726-0001/"
},
{
"name": "1041302",
"refsource": "SECTRACK",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1041302"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 4.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": true
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.6,
"impactScore": 6.0
}
},
"lastModifiedDate": "2022-06-27T17:35Z",
"publishedDate": "2018-07-18T13:29Z"
}
}
}
RHSA-2018:2253
Vulnerability from csaf_redhat - Published: 2018-07-24 21:13 - Updated: 2026-01-13 21:37Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N).
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
Vulnerability in the Java SE component of Oracle Java SE (subcomponent: JavaFX). Supported versions that are affected are Java SE: 7u181, 8u172 and 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171; JRockit: R28.3.18. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
CWE-770 - Allocation of Resources Without Limits or Throttling| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 8u172 and 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SSL/TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64 | — |
Vendor Fix
fix
|
| URL | Category |
|---|---|
| https://access.redhat.com/errata/RHSA-2018:2253 | self |
| https://access.redhat.com/security/updates/classi… | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=1600925 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=1602142 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=1602143 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=1602145 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=1602146 | external |
| https://security.access.redhat.com/data/csaf/v2/a… | self |
| https://access.redhat.com/security/cve/CVE-2018-2940 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=1602146 | external |
| https://www.cve.org/CVERecord?id=CVE-2018-2940 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2018-2940 | external |
| http://www.oracle.com/technetwork/security-adviso… | external |
| https://access.redhat.com/security/cve/CVE-2018-2941 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=1602143 | external |
| https://www.cve.org/CVERecord?id=CVE-2018-2941 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2018-2941 | external |
| https://access.redhat.com/security/cve/CVE-2018-2952 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=1600925 | external |
| https://www.cve.org/CVERecord?id=CVE-2018-2952 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2018-2952 | external |
| https://access.redhat.com/security/cve/CVE-2018-2964 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=1602142 | external |
| https://www.cve.org/CVERecord?id=CVE-2018-2964 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2018-2964 | external |
| https://access.redhat.com/security/cve/CVE-2018-2973 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=1602145 | external |
| https://www.cve.org/CVERecord?id=CVE-2018-2973 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2018-2973 | external |
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for java-1.8.0-oracle is now available for Oracle Java for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Oracle Java SE version 8 includes the Oracle Java Runtime Environment and the Oracle Java Software Development Kit.\n\nThis update upgrades Oracle Java SE 8 to version 8 Update 181.\n\nSecurity Fix(es):\n\n* Oracle JDK: unspecified vulnerability fixed in 7u191, 8u181, and 10.0.2 (JavaFX) (CVE-2018-2941)\n\n* Oracle JDK: unspecified vulnerability fixed in 8u181 and 10.0.2 (Deployment) (CVE-2018-2964)\n\n* Oracle JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (Libraries) (CVE-2018-2940)\n\n* OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547) (CVE-2018-2952)\n\n* Oracle JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (JSSE) (CVE-2018-2973)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:2253",
"url": "https://access.redhat.com/errata/RHSA-2018:2253"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#critical",
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "1600925",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1600925"
},
{
"category": "external",
"summary": "1602142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1602142"
},
{
"category": "external",
"summary": "1602143",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1602143"
},
{
"category": "external",
"summary": "1602145",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1602145"
},
{
"category": "external",
"summary": "1602146",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1602146"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2253.json"
}
],
"title": "Red Hat Security Advisory: java-1.8.0-oracle security update",
"tracking": {
"current_release_date": "2026-01-13T21:37:31+00:00",
"generator": {
"date": "2026-01-13T21:37:31+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.15"
}
},
"id": "RHSA-2018:2253",
"initial_release_date": "2018-07-24T21:13:37+00:00",
"revision_history": [
{
"date": "2018-07-24T21:13:37+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-07-24T21:13:37+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-13T21:37:31+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Oracle Java for Red Hat Enterprise Linux Client (v. 7)",
"product": {
"name": "Oracle Java for Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-OracleJava-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras_oracle_java:7"
}
}
},
{
"category": "product_name",
"name": "Oracle Java for Red Hat Enterprise Linux Compute Node (v. 7)",
"product": {
"name": "Oracle Java for Red Hat Enterprise Linux Compute Node (v. 7)",
"product_id": "7ComputeNode-OracleJava-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras_oracle_java:7"
}
}
},
{
"category": "product_name",
"name": "Oracle Java for Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Oracle Java for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-OracleJava-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras_oracle_java:7"
}
}
},
{
"category": "product_name",
"name": "Oracle Java for Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Oracle Java for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-OracleJava-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras_oracle_java:7"
}
}
}
],
"category": "product_family",
"name": "Oracle Java for Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64",
"product": {
"name": "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64",
"product_id": "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-oracle-jdbc@1.8.0.181-1jpp.2.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64",
"product": {
"name": "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64",
"product_id": "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-oracle-src@1.8.0.181-1jpp.2.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64",
"product": {
"name": "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64",
"product_id": "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-oracle-plugin@1.8.0.181-1jpp.2.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64",
"product": {
"name": "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64",
"product_id": "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-oracle-javafx@1.8.0.181-1jpp.2.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64",
"product": {
"name": "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64",
"product_id": "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-oracle-devel@1.8.0.181-1jpp.2.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64",
"product": {
"name": "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64",
"product_id": "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-oracle@1.8.0.181-1jpp.2.el7?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64"
},
"product_reference": "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64",
"relates_to_product_reference": "7Client-OracleJava-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64"
},
"product_reference": "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64",
"relates_to_product_reference": "7Client-OracleJava-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64"
},
"product_reference": "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64",
"relates_to_product_reference": "7Client-OracleJava-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64"
},
"product_reference": "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64",
"relates_to_product_reference": "7Client-OracleJava-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64"
},
"product_reference": "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64",
"relates_to_product_reference": "7Client-OracleJava-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64"
},
"product_reference": "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64",
"relates_to_product_reference": "7Client-OracleJava-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Compute Node (v. 7)",
"product_id": "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64"
},
"product_reference": "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-OracleJava-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Compute Node (v. 7)",
"product_id": "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64"
},
"product_reference": "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-OracleJava-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Compute Node (v. 7)",
"product_id": "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64"
},
"product_reference": "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-OracleJava-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Compute Node (v. 7)",
"product_id": "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64"
},
"product_reference": "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-OracleJava-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Compute Node (v. 7)",
"product_id": "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64"
},
"product_reference": "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-OracleJava-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Compute Node (v. 7)",
"product_id": "7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64"
},
"product_reference": "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-OracleJava-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64"
},
"product_reference": "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64",
"relates_to_product_reference": "7Server-OracleJava-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64"
},
"product_reference": "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64",
"relates_to_product_reference": "7Server-OracleJava-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64"
},
"product_reference": "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64",
"relates_to_product_reference": "7Server-OracleJava-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64"
},
"product_reference": "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64",
"relates_to_product_reference": "7Server-OracleJava-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64"
},
"product_reference": "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64",
"relates_to_product_reference": "7Server-OracleJava-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64"
},
"product_reference": "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64",
"relates_to_product_reference": "7Server-OracleJava-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64"
},
"product_reference": "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-OracleJava-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64"
},
"product_reference": "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-OracleJava-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64"
},
"product_reference": "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-OracleJava-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64"
},
"product_reference": "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-OracleJava-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64"
},
"product_reference": "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-OracleJava-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64"
},
"product_reference": "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-OracleJava-7.5.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-2940",
"discovery_date": "2018-07-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1602146"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (Libraries)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-2940"
},
{
"category": "external",
"summary": "RHBZ#1602146",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1602146"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-2940",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2940"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-2940",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-2940"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA"
}
],
"release_date": "2018-07-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-07-24T21:13:37+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Oracle Java must be restarted for this update to take effect.",
"product_ids": [
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2253"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (Libraries)"
},
{
"cve": "CVE-2018-2941",
"discovery_date": "2018-07-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1602143"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: JavaFX). Supported versions that are affected are Java SE: 7u181, 8u172 and 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 7u191, 8u181, and 10.0.2 (JavaFX)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-2941"
},
{
"category": "external",
"summary": "RHBZ#1602143",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1602143"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-2941",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2941"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-2941",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-2941"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA"
}
],
"release_date": "2018-07-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-07-24T21:13:37+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Oracle Java must be restarted for this update to take effect.",
"product_ids": [
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2253"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 7u191, 8u181, and 10.0.2 (JavaFX)"
},
{
"cve": "CVE-2018-2952",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2018-07-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1600925"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171; JRockit: R28.3.18. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-2952"
},
{
"category": "external",
"summary": "RHBZ#1600925",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1600925"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-2952",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2952"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-2952",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-2952"
}
],
"release_date": "2018-07-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-07-24T21:13:37+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Oracle Java must be restarted for this update to take effect.",
"product_ids": [
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2253"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 3.7,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547)"
},
{
"cve": "CVE-2018-2964",
"discovery_date": "2018-07-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1602142"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 8u172 and 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 8u181 and 10.0.2 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-2964"
},
{
"category": "external",
"summary": "RHBZ#1602142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1602142"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-2964",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2964"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-2964",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-2964"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA"
}
],
"release_date": "2018-07-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-07-24T21:13:37+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Oracle Java must be restarted for this update to take effect.",
"product_ids": [
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2253"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 8u181 and 10.0.2 (Deployment)"
},
{
"cve": "CVE-2018-2973",
"discovery_date": "2018-07-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1602145"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SSL/TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (JSSE)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-2973"
},
{
"category": "external",
"summary": "RHBZ#1602145",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1602145"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-2973",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2973"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-2973",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-2973"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA"
}
],
"release_date": "2018-07-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-07-24T21:13:37+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Oracle Java must be restarted for this update to take effect.",
"product_ids": [
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2253"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Client-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64",
"7ComputeNode-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Server-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el7.x86_64",
"7Workstation-OracleJava-7.5.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (JSSE)"
}
]
}
RHSA-2018:2256
Vulnerability from csaf_redhat - Published: 2018-07-24 21:09 - Updated: 2026-01-13 22:35Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N).
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
Vulnerability in the Java SE component of Oracle Java SE (subcomponent: JavaFX). Supported versions that are affected are Java SE: 7u181, 8u172 and 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171; JRockit: R28.3.18. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
CWE-770 - Allocation of Resources Without Limits or Throttling| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 8u172 and 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SSL/TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64 | — |
Vendor Fix
fix
|
| URL | Category |
|---|---|
| https://access.redhat.com/errata/RHSA-2018:2256 | self |
| https://access.redhat.com/security/updates/classi… | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=1600925 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=1602142 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=1602143 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=1602145 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=1602146 | external |
| https://security.access.redhat.com/data/csaf/v2/a… | self |
| https://access.redhat.com/security/cve/CVE-2018-2940 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=1602146 | external |
| https://www.cve.org/CVERecord?id=CVE-2018-2940 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2018-2940 | external |
| http://www.oracle.com/technetwork/security-adviso… | external |
| https://access.redhat.com/security/cve/CVE-2018-2941 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=1602143 | external |
| https://www.cve.org/CVERecord?id=CVE-2018-2941 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2018-2941 | external |
| https://access.redhat.com/security/cve/CVE-2018-2952 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=1600925 | external |
| https://www.cve.org/CVERecord?id=CVE-2018-2952 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2018-2952 | external |
| https://access.redhat.com/security/cve/CVE-2018-2964 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=1602142 | external |
| https://www.cve.org/CVERecord?id=CVE-2018-2964 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2018-2964 | external |
| https://access.redhat.com/security/cve/CVE-2018-2973 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=1602145 | external |
| https://www.cve.org/CVERecord?id=CVE-2018-2973 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2018-2973 | external |
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for java-1.8.0-oracle is now available for Oracle Java for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Oracle Java SE version 8 includes the Oracle Java Runtime Environment and the Oracle Java Software Development Kit.\n\nThis update upgrades Oracle Java SE 8 to version 8 Update 181.\n\nSecurity Fix(es):\n\n* Oracle JDK: unspecified vulnerability fixed in 7u191, 8u181, and 10.0.2 (JavaFX) (CVE-2018-2941)\n\n* Oracle JDK: unspecified vulnerability fixed in 8u181 and 10.0.2 (Deployment) (CVE-2018-2964)\n\n* Oracle JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (Libraries) (CVE-2018-2940)\n\n* OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547) (CVE-2018-2952)\n\n* Oracle JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (JSSE) (CVE-2018-2973)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:2256",
"url": "https://access.redhat.com/errata/RHSA-2018:2256"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#critical",
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "1600925",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1600925"
},
{
"category": "external",
"summary": "1602142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1602142"
},
{
"category": "external",
"summary": "1602143",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1602143"
},
{
"category": "external",
"summary": "1602145",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1602145"
},
{
"category": "external",
"summary": "1602146",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1602146"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2256.json"
}
],
"title": "Red Hat Security Advisory: java-1.8.0-oracle security update",
"tracking": {
"current_release_date": "2026-01-13T22:35:56+00:00",
"generator": {
"date": "2026-01-13T22:35:56+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.15"
}
},
"id": "RHSA-2018:2256",
"initial_release_date": "2018-07-24T21:09:42+00:00",
"revision_history": [
{
"date": "2018-07-24T21:09:42+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-07-24T21:09:42+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-13T22:35:56+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Oracle Java for Red Hat Enterprise Linux Desktop 6",
"product": {
"name": "Oracle Java for Red Hat Enterprise Linux Desktop 6",
"product_id": "6Client-OracleJava-6.10.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras_oracle_java:6"
}
}
},
{
"category": "product_name",
"name": "Oracle Java for Red Hat Enterprise Linux HPC Node 6",
"product": {
"name": "Oracle Java for Red Hat Enterprise Linux HPC Node 6",
"product_id": "6ComputeNode-OracleJava-6.10.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras_oracle_java:6"
}
}
},
{
"category": "product_name",
"name": "Oracle Java for Red Hat Enterprise Linux Server 6",
"product": {
"name": "Oracle Java for Red Hat Enterprise Linux Server 6",
"product_id": "6Server-OracleJava-6.10.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras_oracle_java:6"
}
}
},
{
"category": "product_name",
"name": "Oracle Java for Red Hat Enterprise Linux Workstation 6",
"product": {
"name": "Oracle Java for Red Hat Enterprise Linux Workstation 6",
"product_id": "6Workstation-OracleJava-6.10.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras_oracle_java:6"
}
}
}
],
"category": "product_family",
"name": "Oracle Java for Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64",
"product": {
"name": "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64",
"product_id": "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-oracle-jdbc@1.8.0.181-1jpp.2.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64",
"product": {
"name": "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64",
"product_id": "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-oracle-src@1.8.0.181-1jpp.2.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64",
"product": {
"name": "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64",
"product_id": "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-oracle-javafx@1.8.0.181-1jpp.2.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64",
"product": {
"name": "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64",
"product_id": "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-oracle-plugin@1.8.0.181-1jpp.2.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64",
"product": {
"name": "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64",
"product_id": "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-oracle-devel@1.8.0.181-1jpp.2.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64",
"product": {
"name": "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64",
"product_id": "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-oracle@1.8.0.181-1jpp.2.el6?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686",
"product": {
"name": "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686",
"product_id": "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-oracle-jdbc@1.8.0.181-1jpp.2.el6?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686",
"product": {
"name": "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686",
"product_id": "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-oracle-src@1.8.0.181-1jpp.2.el6?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686",
"product": {
"name": "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686",
"product_id": "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-oracle-javafx@1.8.0.181-1jpp.2.el6?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686",
"product": {
"name": "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686",
"product_id": "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-oracle-plugin@1.8.0.181-1jpp.2.el6?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686",
"product": {
"name": "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686",
"product_id": "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-oracle-devel@1.8.0.181-1jpp.2.el6?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686",
"product": {
"name": "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686",
"product_id": "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-oracle@1.8.0.181-1jpp.2.el6?arch=i686\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i686"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Desktop 6",
"product_id": "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686"
},
"product_reference": "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686",
"relates_to_product_reference": "6Client-OracleJava-6.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Desktop 6",
"product_id": "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Client-OracleJava-6.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Desktop 6",
"product_id": "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686"
},
"product_reference": "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686",
"relates_to_product_reference": "6Client-OracleJava-6.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Desktop 6",
"product_id": "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Client-OracleJava-6.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Desktop 6",
"product_id": "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686"
},
"product_reference": "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686",
"relates_to_product_reference": "6Client-OracleJava-6.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Desktop 6",
"product_id": "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Client-OracleJava-6.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Desktop 6",
"product_id": "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686"
},
"product_reference": "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686",
"relates_to_product_reference": "6Client-OracleJava-6.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Desktop 6",
"product_id": "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Client-OracleJava-6.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Desktop 6",
"product_id": "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686"
},
"product_reference": "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686",
"relates_to_product_reference": "6Client-OracleJava-6.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Desktop 6",
"product_id": "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Client-OracleJava-6.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Desktop 6",
"product_id": "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686"
},
"product_reference": "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686",
"relates_to_product_reference": "6Client-OracleJava-6.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Desktop 6",
"product_id": "6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Client-OracleJava-6.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux HPC Node 6",
"product_id": "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686"
},
"product_reference": "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-OracleJava-6.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux HPC Node 6",
"product_id": "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-OracleJava-6.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux HPC Node 6",
"product_id": "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686"
},
"product_reference": "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-OracleJava-6.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux HPC Node 6",
"product_id": "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-OracleJava-6.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux HPC Node 6",
"product_id": "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686"
},
"product_reference": "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-OracleJava-6.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux HPC Node 6",
"product_id": "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-OracleJava-6.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux HPC Node 6",
"product_id": "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686"
},
"product_reference": "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-OracleJava-6.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux HPC Node 6",
"product_id": "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-OracleJava-6.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux HPC Node 6",
"product_id": "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686"
},
"product_reference": "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-OracleJava-6.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux HPC Node 6",
"product_id": "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-OracleJava-6.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux HPC Node 6",
"product_id": "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686"
},
"product_reference": "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-OracleJava-6.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux HPC Node 6",
"product_id": "6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-OracleJava-6.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Server 6",
"product_id": "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686"
},
"product_reference": "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686",
"relates_to_product_reference": "6Server-OracleJava-6.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Server 6",
"product_id": "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Server-OracleJava-6.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Server 6",
"product_id": "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686"
},
"product_reference": "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686",
"relates_to_product_reference": "6Server-OracleJava-6.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Server 6",
"product_id": "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Server-OracleJava-6.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Server 6",
"product_id": "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686"
},
"product_reference": "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686",
"relates_to_product_reference": "6Server-OracleJava-6.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Server 6",
"product_id": "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Server-OracleJava-6.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Server 6",
"product_id": "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686"
},
"product_reference": "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686",
"relates_to_product_reference": "6Server-OracleJava-6.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Server 6",
"product_id": "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Server-OracleJava-6.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Server 6",
"product_id": "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686"
},
"product_reference": "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686",
"relates_to_product_reference": "6Server-OracleJava-6.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Server 6",
"product_id": "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Server-OracleJava-6.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Server 6",
"product_id": "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686"
},
"product_reference": "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686",
"relates_to_product_reference": "6Server-OracleJava-6.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Server 6",
"product_id": "6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Server-OracleJava-6.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Workstation 6",
"product_id": "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686"
},
"product_reference": "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686",
"relates_to_product_reference": "6Workstation-OracleJava-6.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Workstation 6",
"product_id": "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-OracleJava-6.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Workstation 6",
"product_id": "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686"
},
"product_reference": "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686",
"relates_to_product_reference": "6Workstation-OracleJava-6.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Workstation 6",
"product_id": "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-OracleJava-6.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Workstation 6",
"product_id": "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686"
},
"product_reference": "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686",
"relates_to_product_reference": "6Workstation-OracleJava-6.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Workstation 6",
"product_id": "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-OracleJava-6.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Workstation 6",
"product_id": "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686"
},
"product_reference": "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686",
"relates_to_product_reference": "6Workstation-OracleJava-6.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Workstation 6",
"product_id": "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-OracleJava-6.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Workstation 6",
"product_id": "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686"
},
"product_reference": "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686",
"relates_to_product_reference": "6Workstation-OracleJava-6.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Workstation 6",
"product_id": "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-OracleJava-6.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686 as a component of Oracle Java for Red Hat Enterprise Linux Workstation 6",
"product_id": "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686"
},
"product_reference": "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686",
"relates_to_product_reference": "6Workstation-OracleJava-6.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Workstation 6",
"product_id": "6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-OracleJava-6.10.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-2940",
"discovery_date": "2018-07-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1602146"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (Libraries)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-2940"
},
{
"category": "external",
"summary": "RHBZ#1602146",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1602146"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-2940",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2940"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-2940",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-2940"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA"
}
],
"release_date": "2018-07-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-07-24T21:09:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Oracle Java must be restarted for this update to take effect.",
"product_ids": [
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2256"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (Libraries)"
},
{
"cve": "CVE-2018-2941",
"discovery_date": "2018-07-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1602143"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: JavaFX). Supported versions that are affected are Java SE: 7u181, 8u172 and 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 7u191, 8u181, and 10.0.2 (JavaFX)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-2941"
},
{
"category": "external",
"summary": "RHBZ#1602143",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1602143"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-2941",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2941"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-2941",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-2941"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA"
}
],
"release_date": "2018-07-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-07-24T21:09:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Oracle Java must be restarted for this update to take effect.",
"product_ids": [
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2256"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 7u191, 8u181, and 10.0.2 (JavaFX)"
},
{
"cve": "CVE-2018-2952",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2018-07-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1600925"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171; JRockit: R28.3.18. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-2952"
},
{
"category": "external",
"summary": "RHBZ#1600925",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1600925"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-2952",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2952"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-2952",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-2952"
}
],
"release_date": "2018-07-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-07-24T21:09:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Oracle Java must be restarted for this update to take effect.",
"product_ids": [
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2256"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 3.7,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547)"
},
{
"cve": "CVE-2018-2964",
"discovery_date": "2018-07-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1602142"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 8u172 and 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 8u181 and 10.0.2 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-2964"
},
{
"category": "external",
"summary": "RHBZ#1602142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1602142"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-2964",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2964"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-2964",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-2964"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA"
}
],
"release_date": "2018-07-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-07-24T21:09:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Oracle Java must be restarted for this update to take effect.",
"product_ids": [
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2256"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 8u181 and 10.0.2 (Deployment)"
},
{
"cve": "CVE-2018-2973",
"discovery_date": "2018-07-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1602145"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SSL/TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (JSSE)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-2973"
},
{
"category": "external",
"summary": "RHBZ#1602145",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1602145"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-2973",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2973"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-2973",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-2973"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA"
}
],
"release_date": "2018-07-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-07-24T21:09:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Oracle Java must be restarted for this update to take effect.",
"product_ids": [
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2256"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686",
"6Client-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686",
"6ComputeNode-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686",
"6Server-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-devel-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-javafx-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-jdbc-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-plugin-1:1.8.0.181-1jpp.2.el6.x86_64",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.i686",
"6Workstation-OracleJava-6.10.Z:java-1.8.0-oracle-src-1:1.8.0.181-1jpp.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (JSSE)"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.