First published: Fri Aug 17 2018(Updated: )
IBM JDK 8 SR5 FP20 (8.0.5.20), 7 R1 SR4 FP30 (7.1.4.30), 7 SR10 FP30 (7.0.10.30), and 6 SR16 FP70 (6.0.16.70) fix a flaw described by upstream as: The IBM Java Runtime Environment's Diagnostic Tooling Framework for Java (DTFJ) does not protect against path traversal attacks when extracting compressed dump files. References: <a href="https://www-01.ibm.com/support/docview.wss?uid=ibm10719653">https://www-01.ibm.com/support/docview.wss?uid=ibm10719653</a> <a href="https://developer.ibm.com/javasdk/support/security-vulnerabilities/#IBM_Security_Update_August_2018">https://developer.ibm.com/javasdk/support/security-vulnerabilities/#IBM_Security_Update_August_2018</a>
Affected Software | Affected Version | How to fix |
---|---|---|
IBM JDK 8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1618869 is classified as important due to the potential for path traversal attacks.
To fix REDHAT-BUG-1618869, update to the patched versions of the IBM JDK provided in the release notes.
REDHAT-BUG-1618869 affects IBM JDK 8 SR5 FP20, IBM JDK 7 R1 SR4 FP30, IBM JDK 7 SR10 FP30, and IBM JDK 6 SR16 FP70.
REDHAT-BUG-1618869 describes a vulnerability that can be exploited through path traversal attacks.
REDHAT-BUG-1618869 was publicly announced in August 2018 as a security vulnerability.