First published: Tue Jul 16 2019(Updated: )
It was discovered that the implementation of the Throwable class in the Utilities component of OpenJDK did not sufficiently validate serial stream before deserializing suppressed exceptions. A specially-crafted input could cause a Java application to construct inconsistent object and possibly use an excessive amount of system resources when deserialized.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/openjdk-11 | 11.0.24+8-2~deb11u1 11.0.26+4-1~deb11u1 11.0.26+4-1 | |
debian/openjdk-8 | 8u442-ga-2 | |
Oracle JDK 6 | =1.7.0-update221 | |
Oracle JDK 6 | =1.8.0-update211 | |
Oracle JDK 6 | =1.8.0-update212 | |
Oracle JDK 6 | =11.0.3 | |
Oracle JDK 6 | =12.0.1 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update221 | |
Oracle Java Runtime Environment (JRE) | =1.8.0-update211 | |
Oracle Java Runtime Environment (JRE) | =1.8.0-update212 | |
Oracle Java Runtime Environment (JRE) | =11.0.3 | |
Oracle Java Runtime Environment (JRE) | =12.0.1 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =19.04 | |
openSUSE | =15.0 | |
openSUSE | =15.1 | |
Debian | =8.0 | |
redhat satellite | =5.8 | |
Red Hat Enterprise Linux | =8.0 | |
redhat enterprise Linux desktop | =6.0 | |
redhat enterprise Linux desktop | =7.0 | |
redhat enterprise Linux eus | =8.6 | |
redhat enterprise Linux server | =6.0 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux workstation | =6.0 | |
redhat enterprise Linux workstation | =7.0 | |
Trellix ePolicy Orchestrator | =5.9.0 | |
Trellix ePolicy Orchestrator | =5.9.1 | |
Trellix ePolicy Orchestrator | =5.10.0 | |
Trellix ePolicy Orchestrator | =5.10.0-update_1 | |
Trellix ePolicy Orchestrator | =5.10.0-update_2 | |
Trellix ePolicy Orchestrator | =5.10.0-update_3 | |
Trellix ePolicy Orchestrator | =5.10.0-update_4 | |
HP P9000 Command View Advanced Edition Software | <8.7.0-00 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-2762 is medium with a CVSS score of 5.3.
To fix the vulnerability CVE-2019-2762, you should update to the following versions: Java SE: 12.0.2+9-1 or later, Java SE Embedded: 8u211 or later.
The affected versions of Oracle Java SE are Java SE: 7u221, 8u212, 11.0.3, and 12.0.1.
Yes, you can refer to the following advisories: [Oracle Security Advisory](http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html), [Ubuntu Security Notice 4080-1](https://usn.ubuntu.com/4080-1/), [Ubuntu Security Notice 4083-1](https://usn.ubuntu.com/4083-1/).
The affected software packages are openjdk-12 and openjdk-8 on Ubuntu, Oracle JDK and Oracle JRE, Canonical Ubuntu Linux, openSUSE Leap, Debian Debian Linux, Redhat Satellite, Redhat Enterprise Linux, Redhat Enterprise Linux Desktop, Redhat Enterprise Linux Eus, Redhat Enterprise Linux Server, Redhat Enterprise Linux Workstation, McAfee ePolicy Orchestrator, and Hp Xp7 Command View.