IBM JDK 8 SR5 FP20 (8.0.5.20), 7 R1 SR4 FP30 (7.1.4.30), 7 SR10 FP30 (7.0.10.30), and 6 SR16 FP70 (6.0.16.70) fix a flaw described by upstream as: Eclipse OpenJ9 could allow a local attacker to gain elevated privileges on the system, caused by the failure to restrict the use of Java Attach API to connect to an Eclipse OpenJ9 or IBM JVM on the same machine and use Attach API operations to only the process owner. An attacker could exploit this vulnerability to execute untrusted native code and gain elevated privileges on the system. References: https://www-01.ibm.com/support/docview.wss?uid=ibm10719653 https://developer.ibm.com/javasdk/support/security-vulnerabilities/#IBM_Security_Update_August_2018 More details can be found in the Eclipse bugzilla: https://bugs.eclipse.org/bugs/show_bug.cgi?id=534589#c3
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Supplementary Via RHSA-2018:2568 https://access.redhat.com/errata/RHSA-2018:2568
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Supplementary Via RHSA-2018:2569 https://access.redhat.com/errata/RHSA-2018:2569
This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Supplementary Via RHSA-2018:2575 https://access.redhat.com/errata/RHSA-2018:2575
This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Supplementary Via RHSA-2018:2576 https://access.redhat.com/errata/RHSA-2018:2576
This issue has been addressed in the following products: Red Hat Satellite 5.6 Red Hat Satellite 5.7 Via RHSA-2018:2712 https://access.redhat.com/errata/RHSA-2018:2712
This issue has been addressed in the following products: Red Hat Satellite 5.8 Via RHSA-2018:2713 https://access.redhat.com/errata/RHSA-2018:2713