First published: Fri Apr 13 2018(Updated: )
It was discovered that deserialization of multiple classes in the Security component of OpenJDK did not properly ensure consistency of the instances created form the serialized form. A specially-crafted input could cause a Java application to use an excessive amount of memory when deserialized.
Credit: secalert_us@oracle.com secalert_us@oracle.com secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle JDK | =1.6.0-update181 | |
Oracle JDK | =1.7.0-update171 | |
Oracle JDK | =1.8.0-update162 | |
Oracle JDK | =1.10.0 | |
Oracle JRE | =1.6.0-update181 | |
Oracle JRE | =1.7.0-update171 | |
Oracle JRE | =1.8.0-update162 | |
Oracle JRE | =1.10.0 | |
Oracle JRockit | =r28.3.17 | |
Redhat Satellite | =5.6 | |
Redhat Satellite | =5.7 | |
Redhat Satellite | =5.8 | |
Redhat Enterprise Linux Desktop | =6.0 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Server | =6.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Server Aus | =7.6 | |
Redhat Enterprise Linux Server Eus | =7.5 | |
Redhat Enterprise Linux Server Eus | =7.6 | |
Redhat Enterprise Linux Server Tus | =7.6 | |
Redhat Enterprise Linux Workstation | =6.0 | |
Redhat Enterprise Linux Workstation | =7.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =17.10 | |
Hp Xp7 Command View | ||
Schneider-electric Struxureware Data Center Expert | <7.6.0 | |
Oracle JDK | =10 | |
Oracle JRE | =10 | |
debian/openjdk-8 | 8u432-b06-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-2795 is medium.
Java SE versions 6u181, 7u171, 8u162, and 10 are affected by CVE-2018-2795.
An unauthenticated attacker can easily exploit CVE-2018-2795.
The remedy for CVE-2018-2795 is to update to Java SE version 8.
For more information about CVE-2018-2795, you can refer to the Oracle security advisory and other reference links provided.