Bug 1618869 (CVE-2018-1656) - CVE-2018-1656 IBM JDK: path traversal flaw in the Diagnostic Tooling Framework
Summary: CVE-2018-1656 IBM JDK: path traversal flaw in the Diagnostic Tooling Framework
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2018-1656
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1618719 1618720 1618721 1619180 1619181 1619182 1624844 1624845 1624869 1625243
Blocks: 1594250
TreeView+ depends on / blocked
 
Reported: 2018-08-17 20:35 UTC by Tomas Hoger
Modified: 2019-09-29 14:56 UTC (History)
6 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2018-09-17 15:14:32 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2018:2568 0 None None None 2018-08-27 14:21:07 UTC
Red Hat Product Errata RHSA-2018:2569 0 None None None 2018-08-27 14:21:29 UTC
Red Hat Product Errata RHSA-2018:2575 0 None None None 2018-08-28 19:19:26 UTC
Red Hat Product Errata RHSA-2018:2576 0 None None None 2018-08-28 19:21:02 UTC
Red Hat Product Errata RHSA-2018:2712 0 None None None 2018-09-17 14:51:09 UTC
Red Hat Product Errata RHSA-2018:2713 0 None None None 2018-09-17 14:54:31 UTC

Description Tomas Hoger 2018-08-17 20:35:30 UTC
IBM JDK 8 SR5 FP20 (8.0.5.20), 7 R1 SR4 FP30 (7.1.4.30), 7 SR10 FP30 (7.0.10.30), and 6 SR16 FP70 (6.0.16.70) fix a flaw described by upstream as:

The IBM Java Runtime Environment's Diagnostic Tooling Framework for Java (DTFJ) does not protect against path traversal attacks when extracting compressed dump files.

References:

https://www-01.ibm.com/support/docview.wss?uid=ibm10719653
https://developer.ibm.com/javasdk/support/security-vulnerabilities/#IBM_Security_Update_August_2018

Comment 1 errata-xmlrpc 2018-08-27 14:21:00 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7 Supplementary

Via RHSA-2018:2568 https://access.redhat.com/errata/RHSA-2018:2568

Comment 2 errata-xmlrpc 2018-08-27 14:21:24 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7 Supplementary

Via RHSA-2018:2569 https://access.redhat.com/errata/RHSA-2018:2569

Comment 3 errata-xmlrpc 2018-08-28 19:19:21 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6 Supplementary

Via RHSA-2018:2575 https://access.redhat.com/errata/RHSA-2018:2575

Comment 4 errata-xmlrpc 2018-08-28 19:20:58 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6 Supplementary

Via RHSA-2018:2576 https://access.redhat.com/errata/RHSA-2018:2576

Comment 8 errata-xmlrpc 2018-09-17 14:51:04 UTC
This issue has been addressed in the following products:

  Red Hat Satellite 5.6
  Red Hat Satellite 5.7

Via RHSA-2018:2712 https://access.redhat.com/errata/RHSA-2018:2712

Comment 9 errata-xmlrpc 2018-09-17 14:54:24 UTC
This issue has been addressed in the following products:

  Red Hat Satellite 5.8

Via RHSA-2018:2713 https://access.redhat.com/errata/RHSA-2018:2713


Note You need to log in before you can comment on or make changes to this bug.