First published: Fri Apr 13 2018(Updated: )
A flaw was found in the way the Hotspot component of OpenJDK handled clones of the java.lang.ref.Reference objects. An untrusted Java application or applet could use this flaw to bypass Java sandbox restrictions.
Credit: secalert_us@oracle.com secalert_us@oracle.com secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle JDK | =1.6.0-update181 | |
Oracle JDK | =1.7.0-update171 | |
Oracle JDK | =1.8.0-update162 | |
Oracle JDK | =1.10.0 | |
Oracle JRE | =1.6.0-update181 | |
Oracle JRE | =1.7.0-update171 | |
Oracle JRE | =1.8.0-update162 | |
Oracle JRE | =1.10.0 | |
Redhat Enterprise Linux Desktop | =6.0 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Server | =6.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Server Aus | =7.6 | |
Redhat Enterprise Linux Server Eus | =7.5 | |
Redhat Enterprise Linux Server Eus | =7.6 | |
Redhat Enterprise Linux Server Tus | =7.6 | |
Redhat Enterprise Linux Workstation | =6.0 | |
Redhat Enterprise Linux Workstation | =7.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =17.10 | |
Schneider-electric Struxureware Data Center Expert | <7.6.0 | |
Hp Xp7 Command View | ||
Oracle JDK | =10 | |
Oracle JRE | =10 | |
debian/openjdk-8 | 8u432-b06-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-2814 is high.
Java SE versions 6u181, 7u171, 8u162, and 10 are affected by CVE-2018-2814.
CVE-2018-2814 can be exploited by an unauthenticated attacker with network access.
The remedy for CVE-2018-2814 on Ubuntu is to update OpenJDK 7 to version 7u171 or OpenJDK 8 to version 8u382-ga-2.
You can find more information about CVE-2018-2814 in the Oracle Security Advisory CPUApr2018.