First published: Mon Oct 15 2018(Updated: )
It was discovered that the Hotspot component of OpenJDK did not perform access checks correctly in certain cases when performing field link resolution. An untrusted Java application or applet could use this flaw to bypass Java sandbox restrictions.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/openjdk-11 | 11.0.24+8-2~deb11u1 11.0.25+9-1~deb11u1 11.0.26+4-1 | |
debian/openjdk-8 | 8u432-b06-2 | |
Oracle Java SE 7 | =1.7.0-update191 | |
Oracle Java SE 7 | =1.8.0-update181 | |
Oracle Java SE 7 | =11.0.0 | |
Oracle JRE | =1.7.0-update191 | |
Oracle JRE | =1.8.0-update181 | |
Oracle JRE | =11.0.0 | |
Red Hat Satellite | =5.6 | |
Red Hat Satellite | =5.7 | |
Red Hat Satellite | =5.8 | |
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux Server EUS | =7.6 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Server | =7.6 | |
Red Hat Enterprise Linux Server | =7.5 | |
Red Hat Enterprise Linux Server | =7.6 | |
Red Hat Enterprise Linux Workstation | =6.0 | |
Red Hat Enterprise Linux Workstation | =7.0 | |
Debian Linux | =8.0 | |
Debian Linux | =9.0 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =18.10 | |
HP P9000 Command View Advanced Edition Software | <8.6.3-00 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-3169 is a vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot).
Java SE versions 7u191, 8u182, and 11 are affected by CVE-2018-3169.
CVE-2018-3169 has a severity rating of 8.3 (high).
To fix CVE-2018-3169, update to the recommended versions of Java SE provided by your software vendor.
You can find more information about CVE-2018-3169 in the references provided: [Link 1](https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html#AppendixJAVA), [Link 2](https://access.redhat.com/errata/RHSA-2018:2942), [Link 3](https://access.redhat.com/errata/RHSA-2018:2943).