First published: Tue Mar 05 2019(Updated: )
IBM JDK 8 SR5 FP30 (8.0.5.30) fixes a flaw described by upstream as: Eclipse OpenJ9 could allow a remote attacker to execute arbitrary code on the system, caused by the failure to omit a null check on the receiver object of an Unsafe call when accelerating it. An attacker could exploit this vulnerability to execute arbitrary code on the system. OpenJ9 upstream bug: <a href="https://bugs.eclipse.org/bugs/show_bug.cgi?id=544019">https://bugs.eclipse.org/bugs/show_bug.cgi?id=544019</a> Related OpenJ9 upstream commit seems to be: <a href="https://github.com/eclipse/openj9/commit/531d3f96fe9cdcf6baad9f6d6837be8fbc805d8d">https://github.com/eclipse/openj9/commit/531d3f96fe9cdcf6baad9f6d6837be8fbc805d8d</a> References: <a href="https://www-01.ibm.com/support/docview.wss?uid=ibm10873332">https://www-01.ibm.com/support/docview.wss?uid=ibm10873332</a> <a href="https://developer.ibm.com/javasdk/support/security-vulnerabilities/#IBM_Security_Update_March_2019">https://developer.ibm.com/javasdk/support/security-vulnerabilities/#IBM_Security_Update_March_2019</a>
Affected Software | Affected Version | How to fix |
---|---|---|
IBM JDK 8 | ||
Eclipse OpenJ9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
REDHAT-BUG-1685717 is classified as a high-severity vulnerability due to its potential to allow remote code execution.
To fix REDHAT-BUG-1685717, you should update to IBM JDK 8 SR5 FP30 (8.0.5.30) or later versions that address this issue.
Users of IBM JDK 8 and Eclipse OpenJ9 who have not updated to the patched versions are affected by REDHAT-BUG-1685717.
If REDHAT-BUG-1685717 is exploited, a remote attacker could execute arbitrary code on the vulnerable system.
Currently, the recommended approach for REDHAT-BUG-1685717 is to apply the patch, as no official workaround is documented.