CVE-2018-2582

Priority
Description
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE
(subcomponent: Hotspot). Supported versions that are affected are Java SE:
8u152 and 9.0.1; Java SE Embedded: 8u151. Easily exploitable vulnerability
allows unauthenticated attacker with network access via multiple protocols
to compromise Java SE, Java SE Embedded. Successful attacks require human
interaction from a person other than the attacker. Successful attacks of
this vulnerability can result in unauthorized creation, deletion or
modification access to critical data or all Java SE, Java SE Embedded
accessible data. Note: This vulnerability applies to client and server
deployment of Java. This vulnerability can be exploited through sandboxed
Java Web Start applications and sandboxed Java applets. It can also be
exploited by supplying data to APIs in the specified Component without
using sandboxed Java Web Start applications or sandboxed Java applets, such
as through a web service. CVSS 3.0 Base Score 6.5 (Integrity impacts). CVSS
Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N).
Ubuntu-Description
It was discovered that the Hotspot component of OpenJDK did not
properly validate uses of the invokeinterface JVM instruction. An
attacker could possibly use this to access unauthorized resources.
Notes
Package
Upstream:released (8u162-b12-1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):released (8u162-b12-0ubuntu0.16.04.2)
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (8u162-b12-1)
Ubuntu 19.04 (Disco Dingo):not-affected (8u162-b12-1)
Ubuntu 19.10 (Eoan Ermine):not-affected (8u162-b12-1)
Ubuntu 20.04 (Focal Fossa):not-affected (8u162-b12-1)
Patches:
Upstream:http://hg.openjdk.java.net/jdk8u/jdk8u/jdk/rev/a3e756231625
Upstream:http://hg.openjdk.java.net/jdk8u/jdk8u/hotspot/rev/f8a45a60bc6b
Upstream:http://hg.openjdk.java.net/jdk8u/jdk8u/hotspot/rev/b1606443958a
Package
Upstream:released (9.0.4+12-1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):needed
Ubuntu 18.04 LTS (Bionic Beaver):DNE
Ubuntu 19.04 (Disco Dingo):DNE
Ubuntu 19.10 (Eoan Ermine):DNE
Ubuntu 20.04 (Focal Fossa):DNE
More Information

Updated: 2019-12-05 19:56:10 UTC (commit 0aa5e7c87c8b55d2ec5c7f4ca1179cf75de91961)