First published: Tue Jul 14 2015(Updated: )
An unspecified flaw was found in the Libraries component in OpenJDK. ObjectInputStream's readSerialData() could, in certain cases, incorrectly perform deserialization of data from serialized input. An untrusted Java application or applet could use this flaw to bypass Java sandbox restrictions.
Credit: secalert_us@oracle.com secalert_us@oracle.com secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/openjdk-8 | 8u442-ga-2 | |
Oracle Java SE 7 | ||
Oracle Java SE 7 | =1.6.0-update95 | |
Oracle Java SE 7 | =1.7.0-update75 | |
Oracle Java SE 7 | =1.7.0-update80 | |
Oracle Java SE 7 | =1.8.0-update_33 | |
Oracle Java SE 7 | =1.8.0-update45 | |
Oracle JRE | =1.6.0-update_95 | |
Oracle JRE | =1.7.0-update_75 | |
Oracle JRE | =1.7.0-update_80 | |
Oracle JRE | =1.8.0-update_33 | |
Oracle JRE | =1.8.0-update_45 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =15.04 | |
Debian Linux | =7.0 | |
Debian Linux | =8.0 | |
SUSE Linux Enterprise Debuginfo | =11-sp3 | |
SUSE Linux Enterprise Debuginfo | =11-sp4 | |
openSUSE | =13.1 | |
openSUSE | =13.2 | |
SUSE Linux Enterprise Desktop | =11-sp3 | |
SUSE Linux Enterprise Desktop | =11-sp4 | |
SUSE Linux Enterprise Desktop | =12 | |
SUSE Linux Enterprise Server | =12 | |
Red Hat Satellite | =5.6 | |
Red Hat Satellite | =5.7 | |
Red Hat Enterprise Linux Desktop | =5.0 | |
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux Server EUS | =6.6 | |
Red Hat Enterprise Linux Server EUS | =6.7 | |
Red Hat Enterprise Linux Server EUS | =7.1 | |
Red Hat Enterprise Linux Server EUS | =7.2 | |
Red Hat Enterprise Linux Server EUS | =7.3 | |
Red Hat Enterprise Linux Server EUS | =7.4 | |
Red Hat Enterprise Linux Server EUS | =7.5 | |
Red Hat Enterprise Linux for IBM Z Systems | =6.0_s390x | |
Red Hat Enterprise Linux for IBM Z Systems (s390x) | =6.7_s390x | |
Red Hat Enterprise Linux for IBM Z Systems (s390x) | =7.1_s390x | |
Red Hat Enterprise Linux for IBM Z Systems (s390x) | =7.2_s390x | |
Red Hat Enterprise Linux for IBM Z Systems (s390x) | =7.3_s390x | |
Red Hat Enterprise Linux for IBM Z Systems (s390x) | =7.4_s390x | |
Red Hat Enterprise Linux for IBM Z Systems (s390x) | =7.5_s390x | |
Red Hat Enterprise Linux for Power, big endian | =6.0_ppc64 | |
Red Hat Enterprise Linux for Power, big endian | =7.0_ppc64 | |
Red Hat Enterprise Linux for Power, Big Endian EUS | =6.7_ppc64 | |
Red Hat Enterprise Linux for Power, Big Endian EUS | =7.1_ppc64 | |
Red Hat Enterprise Linux for Power, Big Endian EUS | =7.2_ppc64 | |
Red Hat Enterprise Linux for Power, Big Endian EUS | =7.3_ppc64 | |
Red Hat Enterprise Linux for Power, Big Endian EUS | =7.4_ppc64 | |
Red Hat Enterprise Linux for Power, Big Endian EUS | =7.5_ppc64 | |
Red Hat Enterprise Linux for Power, little endian | =7.0_ppc64le | |
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | =7.1_ppc64le | |
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | =7.2_ppc64le | |
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | =7.3_ppc64le | |
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | =7.4_ppc64le | |
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | =7.5_ppc64le | |
Red Hat Enterprise Linux Server | =5.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Server | =6.6 | |
Red Hat Enterprise Linux Server | =7.3 | |
Red Hat Enterprise Linux Server | =7.4 | |
Red Hat Enterprise Linux Server | =7.6 | |
Red Hat Enterprise Linux Server | =7.7 | |
Red Hat Enterprise Linux Server | =6.6 | |
Red Hat Enterprise Linux Server | =7.3 | |
Red Hat Enterprise Linux Server | =7.6 | |
Red Hat Enterprise Linux Server | =7.7 | |
Red Hat Enterprise Linux Workstation | =5.0 | |
Red Hat Enterprise Linux Workstation | =6.0 | |
Red Hat Enterprise Linux Workstation | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2015-2590 is critical with a severity value of 10.
Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 are affected by CVE-2015-2590.
Remote attackers can exploit CVE-2015-2590 to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
You can find more information about CVE-2015-2590 on the Oracle website and the Trend Micro blog.
Apply the patches provided by Oracle and ensure that you are using the latest version of Oracle Java SE or Java SE Embedded.