First published: Mon Jan 14 2019(Updated: )
A memory disclosure flaw was found in the FileChannelImpl class in the Libraries component of OpenJDK. An untrusted Java application or applet could use this flaw leak limited amount of Java Virtual Machine memory possibly containing sensitive information, resulting in a partial bypass of Java sandbox restrictions.
Credit: secalert_us@oracle.com secalert_us@oracle.com secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle JDK | =1.7.0-update201 | |
Oracle JDK | =1.8.0-update192 | |
Oracle JDK | =11.0.1 | |
Oracle JRE | =1.7.0-update201 | |
Oracle JRE | =1.8.0-update192 | |
Oracle JRE | =11.0.1 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =18.10 | |
Netapp Oncommand Unified Manager | ||
Netapp Oncommand Unified Manager Windows | >=7.3 | |
Netapp Oncommand Unified Manager Vmware | >=9.4 | |
NetApp OnCommand Workflow Automation | ||
Netapp Snapmanager Oracle | ||
Netapp Snapmanager Sap | ||
Redhat Satellite | =5.8 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux Desktop | =6.0 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Eus | =8.6 | |
Redhat Enterprise Linux Server | =6.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Server | =7.6 | |
Redhat Enterprise Linux Server Aus | =7.6 | |
Redhat Enterprise Linux Server Eus | =7.6 | |
Redhat Enterprise Linux Server Tus | =7.6 | |
Redhat Enterprise Linux Workstation | =6.0 | |
Redhat Enterprise Linux Workstation | =7.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
openSUSE Leap | =15.0 | |
openSUSE Leap | =42.3 | |
Hp Xp7 Command View | <8.6.4-00 | |
debian/openjdk-11 | 11.0.24+8-2~deb11u1 11.0.25+9-1~deb11u1 11.0.25+9-1 | |
debian/openjdk-8 | 8u432-b06-2 | |
=1.7.0-update201 | ||
=1.8.0-update192 | ||
=11.0.1 | ||
=1.7.0-update201 | ||
=1.8.0-update192 | ||
=11.0.1 | ||
=14.04 | ||
=16.04 | ||
=18.04 | ||
=18.10 | ||
>=7.3 | ||
>=9.4 | ||
=5.8 | ||
=8.0 | ||
=6.0 | ||
=7.0 | ||
=8.6 | ||
=6.0 | ||
=7.0 | ||
=7.6 | ||
=7.6 | ||
=7.6 | ||
=7.6 | ||
=6.0 | ||
=7.0 | ||
=8.0 | ||
=9.0 | ||
=15.0 | ||
=42.3 | ||
<8.6.4-00 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-2422 is a vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries).
Java SE: 7u201, 8u192, and 11.0.1 are the supported versions affected by CVE-2019-2422.
CVE-2019-2422 has a severity rating of 3.1, which is considered medium severity.
Exploiting CVE-2019-2422 requires a difficult-to-exploit vulnerability that allows an unauthenticated attacker with network access via multiple protocols to compromise Java SE.
To remediate CVE-2019-2422, update Oracle Java SE to the latest version available for your supported version: 7u201, 8u192, or 11.0.1.