First published: Mon Jan 15 2018(Updated: )
It was discovered that the JGSS component of OpenJDK failed to properly handle GSS context in the native GSS library wrapper in certain cases. A remote attacker could possibly make a Java application using JGSS to use previously freed context.
Credit: secalert_us@oracle.com secalert_us@oracle.com secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/openjdk-8 | 8u442-ga-2 | |
Oracle JDK 6 | =1.6.0-update171 | |
Oracle JDK 6 | =1.7.0-update161 | |
Oracle JDK 6 | =1.8.0-update152 | |
Oracle JDK 6 | =9.0.1 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update171 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update161 | |
Oracle Java Runtime Environment (JRE) | =1.8.0-update152 | |
Oracle Java Runtime Environment (JRE) | =9.0.1 | |
BEA JRockit | =r28.3.16 | |
redhat satellite | =5.6 | |
redhat satellite | =5.7 | |
redhat satellite | =5.8 | |
redhat enterprise Linux desktop | =6.0 | |
redhat enterprise Linux desktop | =7.0 | |
redhat enterprise Linux server | =6.0 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux server aus | =7.4 | |
redhat enterprise Linux server aus | =7.6 | |
redhat enterprise Linux server eus | =7.4 | |
redhat enterprise Linux server eus | =7.5 | |
redhat enterprise Linux server eus | =7.6 | |
redhat enterprise Linux server tus | =7.4 | |
redhat enterprise Linux server tus | =7.6 | |
redhat enterprise Linux workstation | =6.0 | |
redhat enterprise Linux workstation | =7.0 | |
Debian | =7.0 | |
Debian | =8.0 | |
Debian | =9.0 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =17.10 | |
Schneider Electric EcoStruxure Data Center Expert | <7.6.0 | |
HP P9000 Command View Advanced Edition Software | >=8.6.2-01 | |
HP XP P9000 Command View | >=8.6.2-01 | |
HP P9000 Command View Advanced Edition Software | >=8.6.2-01 | |
Oracle JDK 6 | =1.9.0.1 | |
Oracle Java Runtime Environment (JRE) | =1.9.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-2629 is a vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE that allows an unauthenticated attacker to compromise the confidentiality, integrity, and availability of the system.
Java SE versions 6u171, 7u161, 8u152, and 9.0.1 are affected by CVE-2018-2629.
An attacker can exploit CVE-2018-2629 by performing a difficult to exploit vulnerability, allowing them to compromise the system without authentication.
CVE-2018-2629 has a severity rating of 5.3, which is considered medium.
You can find more information about CVE-2018-2629 on the Oracle website and security advisory links provided in the references section.