First published: Mon Jul 15 2019(Updated: )
It was discovered that crypto provider implementations in the JCE component of OpenJDK for crypto algorithms such as AES or SHA did not perform array bounds checks. This could lead to out-of-bounds access if compiler intrinsics were used instead of the Java runtime implementations of the specific operations.
Credit: secalert_us@oracle.com secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle JDK | =1.8.0-update212 | |
Oracle JRE | =1.8.0-update212 | |
openSUSE Leap | =15.0 | |
openSUSE Leap | =15.1 | |
Hp Xp7 Command View | <8.7.0-00 | |
McAfee ePolicy Orchestrator | =5.9.0 | |
McAfee ePolicy Orchestrator | =5.9.1 | |
McAfee ePolicy Orchestrator | =5.10.0 | |
McAfee ePolicy Orchestrator | =5.10.0-update_1 | |
McAfee ePolicy Orchestrator | =5.10.0-update_2 | |
McAfee ePolicy Orchestrator | =5.10.0-update_3 | |
McAfee ePolicy Orchestrator | =5.10.0-update_4 | |
Canonical Ubuntu Linux | =16.04 | |
debian/openjdk-8 | 8u432-b06-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-2842 is a vulnerability in the Java SE component of Oracle Java SE, specifically in the JCE (Java Cryptography Extension) subcomponent.
CVE-2019-2842 has a severity level of medium (3.7).
An unauthenticated attacker with network access via multiple protocols can exploit CVE-2019-2842 to compromise Java SE.
Java SE version 8u212 is the supported version affected by CVE-2019-2842.
To fix CVE-2019-2842, it is recommended to update to the latest available version of Java SE (8u212 or higher) provided by Oracle or your respective software vendor.