First published: Mon Jul 15 2019(Updated: )
It was discovered that the implementation of the Collections class in the Utilities component of OpenJDK did not limit the amount of memory allocated when creating object instance from a serialized form. A specially-crafted input could cause a Java application to use an excessive amount of memory when deserialized.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/openjdk-11 | 11.0.24+8-2~deb11u1 11.0.26+4-1~deb11u1 11.0.26+4-1 | |
debian/openjdk-8 | 8u442-ga-2 | |
Oracle JDK 6 | =1.7.0-update221 | |
Oracle JDK 6 | =1.8.0-update211 | |
Oracle JDK 6 | =1.8.0-update212 | |
Oracle JDK 6 | =11.0.3 | |
Oracle JDK 6 | =12.0.1 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update221 | |
Oracle Java Runtime Environment (JRE) | =1.8.0-update211 | |
Oracle Java Runtime Environment (JRE) | =1.8.0-update212 | |
Oracle Java Runtime Environment (JRE) | =11.0.3 | |
Oracle Java Runtime Environment (JRE) | =12.0.1 | |
Debian | =8.0 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =19.04 | |
redhat satellite | =5.8 | |
Red Hat Enterprise Linux | =8.0 | |
redhat enterprise Linux desktop | =6.0 | |
redhat enterprise Linux desktop | =7.0 | |
redhat enterprise Linux eus | =8.6 | |
redhat enterprise Linux server | =6.0 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux workstation | =6.0 | |
redhat enterprise Linux workstation | =7.0 | |
HP P9000 Command View Advanced Edition Software | <8.7.0-00 | |
Trellix ePolicy Orchestrator | =5.9.0 | |
Trellix ePolicy Orchestrator | =5.9.1 | |
Trellix ePolicy Orchestrator | =5.10.0 | |
Trellix ePolicy Orchestrator | =5.10.0-update_1 | |
Trellix ePolicy Orchestrator | =5.10.0-update_2 | |
Trellix ePolicy Orchestrator | =5.10.0-update_3 | |
Trellix ePolicy Orchestrator | =5.10.0-update_4 | |
openSUSE | =15.0 | |
openSUSE | =15.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-2769 is medium with a severity value of 5.3.
Java SE versions 7u221, 8u212, 11.0.3, and 12.0.1 are affected by CVE-2019-2769.
Yes, CVE-2019-2769 is easily exploitable by an unauthenticated attacker with network access.
To fix CVE-2019-2769, update to Java SE version 12.0.2+9-1 or later.
You can find more information about CVE-2019-2769 in the following references: [Oracle Security Advisory](http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html), [Ubuntu Security Notice 4080-1](https://usn.ubuntu.com/4080-1/), [Ubuntu Security Notice 4083-1](https://usn.ubuntu.com/4083-1/).