SB2018031901 - Gentoo update for Oracle JDK/JRE
Published: March 19, 2018
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 17 secuirty vulnerabilities.
1) Information disclosure (CVE-ID: CVE-2018-2579)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.The weakness exists due to a flaw in the Java SE, Java SE Embedded, JRockit Libraries component. A remote attacker can partially access data.
2) Information disclosure (CVE-ID: CVE-2018-2581)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.The weakness exists due to a flaw in the Java SE JavaFX component. A remote attacker can partially access data.
3) Security restrictions bypass (CVE-ID: CVE-2018-2582)
The vulnerability allows a remote attacker to bypass security restrictions on the target system.The weakness exists due to a flaw in the Java SE, Java SE Embedded, JRockit Libraries component. A remote attacker can modify data.
4) Information disclosure (CVE-ID: CVE-2018-2588)
The vulnerability allows a remote authenticated attacker to obtain potentially sensitive information on the target system.The weakness exists due to a flaw in the Java SE, Java SE Embedded, JRockit LDAP component. A remote attacker can partially access data.
5) Security restrictions bypass (CVE-ID: CVE-2018-2599)
The vulnerability allows a remote attacker to bypass security restrictions on the target system.The weakness exists due to a flaw in the Java SE, Java SE Embedded, JRockit JNDI component. A remote attacker can partially modify data and cause partial denial of service conditions.
6) Security restrictions bypass (CVE-ID: CVE-2018-2602)
The vulnerability allows a local attacker to bypass security restrictions on the target system.The weakness exists due to a flaw in the Java SE, Java SE Embedded I18n component. A local attacker can partially access data, partially modify data, and partially deny service.
7) Security restrictions bypass (CVE-ID: CVE-2018-2603)
The vulnerability allows a remote attacker to bypass security restrictions on the target system.The weakness exists due to a flaw in the Java SE, Java SE Embedded, JRockit Libraries component. A remote attacker can cause partial denial of service conditions.
8) Information disclosure (CVE-ID: CVE-2018-2618)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.The weakness exists due to a flaw in the Java SE, Java SE Embedded, JRockit JCE component. A remote attacker can access data.
9) Privilege escalation (CVE-ID: CVE-2018-2627)
The vulnerability allows a local attacker to gain elevated privileges.The weakness exists due to a flaw in the Java SE Installer. A local attacker can gain system privileges on the target system.
10) Security restrictions bypass (CVE-ID: CVE-2018-2629)
The vulnerability allows a remote attacker to bypass security restrictions on the target system.The weakness exists due to a flaw in the Java SE, Java SE Embedded, JRockit JGSS component. A remote attacker can modify data.
11) Privilege escalation (CVE-ID: CVE-2018-2633)
The vulnerability allows a remote attacker to gain elevated privileges.The weakness exists due to a flaw in the Java SE, Java SE Embedded, JRockit JNDI component. A remote attacker can gain system privileges on the target system.
12) Information disclosure (CVE-ID: CVE-2018-2634)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.The weakness exists due to a flaw in the Java SE, Java SE Embedded JGSS component. A remote attacker can access data.
13) Security restrictions bypass (CVE-ID: CVE-2018-2637)
The vulnerability allows a local attacker to bypass security restrictions on the target system.The weakness exists due to a flaw in the Java SE, Java SE Embedded, JRockit JMX component. A remote attacker can access and modify data.
14) Privilege escalation (CVE-ID: CVE-2018-2638)
The vulnerability allows a remote attacker to gain elevated privileges.The weakness exists due to a flaw in the Java SE Deployment component. A remote attacker can gain system privileges on the target system.
15) Privilege escalation (CVE-ID: CVE-2018-2639)
The vulnerability allows a remote attacker to gain elevated privileges.The weakness exists due to a flaw in the Java SE Deployment component. A remote attacker can gain system privileges on the target system.
16) Security restrictions bypass (CVE-ID: CVE-2018-2641)
The vulnerability allows a remote attacker to bypass security restrictions on the target system.The weakness exists due to a flaw in the Java SE, Java SE Embedded AWT component. A remote attacker can modify data.
17) Denial of service (CVE-ID: CVE-2018-2663)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists due to a flaw in the Java SE, Java SE Embedded, JRockit Libraries component. A remote attacker can cause partial denial of service conditions.
Remediation
Install update from vendor's website.