First published: Fri Apr 13 2018(Updated: )
It was discovered that the Security component of OpenJDK did not restrict which classes could be used when deserializing keys form the JCEKS key stores. A specially crafted JCEKS key store could possibly use this flaw to execute arbitrary code with the privileges of an application reading data form the key store. The fix adds support for a new security property jceks.key.serialFilter which can be used to specify classes that can be used when deserializing data from the JCEKS key stores.
Credit: secalert_us@oracle.com secalert_us@oracle.com secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle JDK | =1.6.0-update181 | |
Oracle JDK | =1.7.0-update171 | |
Oracle JDK | =1.8.0-update162 | |
Oracle JDK | =1.10.0 | |
Oracle JRE | =1.6.0-update181 | |
Oracle JRE | =1.7.0-update171 | |
Oracle JRE | =1.8.0-update162 | |
Oracle JRE | =1.10.0 | |
Oracle JRockit | =r28.3.17 | |
Redhat Satellite | =5.6 | |
Redhat Satellite | =5.7 | |
Redhat Satellite | =5.8 | |
Redhat Enterprise Linux Desktop | =6.0 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Server | =6.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Server Aus | =7.6 | |
Redhat Enterprise Linux Server Eus | =7.5 | |
Redhat Enterprise Linux Server Eus | =7.6 | |
Redhat Enterprise Linux Server Tus | =7.6 | |
Redhat Enterprise Linux Workstation | =6.0 | |
Redhat Enterprise Linux Workstation | =7.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =17.10 | |
Hp Xp7 Command View | ||
Schneider-electric Struxureware Data Center Expert | <7.6.0 | |
Oracle JDK | =10 | |
Oracle JRE | =10 | |
debian/openjdk-8 | 8u432-b06-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-2794 is a vulnerability in the Java SE JRockit component of Oracle Java SE (subcomponent: Security).
Java SE: 6u181, 7u171, 8u162, 10
CVE-2018-2794 has a severity rating of 7.7 (high).
To fix CVE-2018-2794, update to the following versions: openjdk-8u382-ga-2, Oracle JDK 1.6.0-update181, 1.7.0-update171, 1.8.0-update162, 1.10.0, or Oracle JRockit r28.3.17.
You can find more information about CVE-2018-2794 on the Oracle Security Advisory and SecurityFocus websites.