Bug 1090197 (CVE-2018-2826) - VUL-0: CVE-2018-2826: java-10-openjdk: incorrect type check for the MethodHandles' tryFinally cleanup exception type (Libraries, 8194238)
Summary: VUL-0: CVE-2018-2826: java-10-openjdk: incorrect type check for the MethodHan...
Status: RESOLVED WONTFIX
Alias: CVE-2018-2826
Product: openSUSE Distribution
Classification: openSUSE
Component: Security (show other bugs)
Version: Leap 42.3
Hardware: Other Other
: P3 - Medium : Major (vote)
Target Milestone: ---
Assignee: Fridrich Strba
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/204105/
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2018-04-19 10:14 UTC by Johannes Segitz
Modified: 2019-09-02 14:39 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Johannes Segitz 2018-04-19 10:14:41 UTC
rh#1568520

Vulnerability in the Java SE component of Oracle Java SE (subcomponent:
Libraries). The supported version that is affected is Java SE: 10. Difficult to
exploit vulnerability allows unauthenticated attacker with network access via
multiple protocols to compromise Java SE. Successful attacks require human
interaction from a person other than the attacker and while the vulnerability is
in Java SE, attacks may significantly impact additional products. Successful
attacks of this vulnerability can result in takeover of Java SE. Note: This
vulnerability applies to Java deployments, typically in clients running
sandboxed Java Web Start applications or sandboxed Java applets, that load and
run untrusted code (e.g., code that comes from the internet) and rely on the
Java sandbox for security. This vulnerability does not apply to Java
deployments, typically in servers, that load and run only trusted code (e.g.,
code installed by an administrator). 

CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). 
CVSS Vector:
(CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).

References:
https://bugzilla.redhat.com/show_bug.cgi?id=1568520
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-2826
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html#CVE-2018-2826
http://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-2826.html
Comment 1 Tomáš Chvátal 2019-07-11 11:29:34 UTC
This is automated batch bugzilla cleanup.

The openSUSE 42.3 changed to end-of-life (EOL [1]) status. As such
it is no longer maintained, which means that it will not receive any
further security or bug fix updates.
As a result we are closing this bug.

If you can reproduce this bug against a currently maintained version of 
openSUSE (At this moment openSUSE Leap 15.1, 15.0 and Tumbleweed) please
feel free to reopen this bug against that version (!you must update the
"Version" component in the bug fields, do not just reopen please), or
alternatively create a new ticket.

Thank you for reporting this bug and we are sorry it could not be fixed
during the lifetime of the release.

[1] https://en.opensuse.org/Lifetime