You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa openjdk-8 i openjdk-lts

Sigurnosni nedostaci programskog paketa openjdk-8 i openjdk-lts

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LUB

==========================================================================
Ubuntu Security Notice USN-3975-1
May 13, 2019

openjdk-8, openjdk-lts vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 19.04
– Ubuntu 18.10
– Ubuntu 18.04 LTS
– Ubuntu 16.04 LTS

Summary:

Several security issues were fixed in OpenJDK.

Software Description:
– openjdk-lts: Open Source Java implementation
– openjdk-8: Open Source Java implementation

Details:

It was discovered that the BigDecimal implementation in OpenJDK performed
excessive computation when given certain values. An attacker could use this
to cause a denial of service (excessive CPU usage). (CVE-2019-2602)

Corwin de Boor and Robert Xiao discovered that the RMI registry
implementation in OpenJDK did not properly select the correct skeleton
class in some situations. An attacker could use this to possibly escape
Java sandbox restrictions. (CVE-2019-2684)

Mateusz Jurczyk discovered a vulnerability in the 2D component of
OpenJDK. An attacker could use this to possibly escape Java sandbox
restrictions. This issue only affected OpenJDK 8 in Ubuntu 16.04
LTS. (CVE-2019-2697)

Mateusz Jurczyk discovered a vulnerability in the font layout engine
of OpenJDK’s 2D component. An attacker could use this to possibly
escape Java sandbox restrictions. This issue only affected OpenJDK 8
in Ubuntu 16.04 LTS. (CVE-2019-2698)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 19.04:
openjdk-11-jdk 11.0.3+7-1ubuntu2~19.04.1
openjdk-11-jdk-headless 11.0.3+7-1ubuntu2~19.04.1
openjdk-11-jre 11.0.3+7-1ubuntu2~19.04.1
openjdk-11-jre-headless 11.0.3+7-1ubuntu2~19.04.1

Ubuntu 18.10:
openjdk-11-jdk 11.0.3+7-1ubuntu2~18.10.1
openjdk-11-jdk-headless 11.0.3+7-1ubuntu2~18.10.1
openjdk-11-jre 11.0.3+7-1ubuntu2~18.10.1
openjdk-11-jre-headless 11.0.3+7-1ubuntu2~18.10.1

Ubuntu 18.04 LTS:
openjdk-11-jdk 11.0.3+7-1ubuntu2~18.04.1
openjdk-11-jdk-headless 11.0.3+7-1ubuntu2~18.04.1
openjdk-11-jre 11.0.3+7-1ubuntu2~18.04.1
openjdk-11-jre-headless 11.0.3+7-1ubuntu2~18.04.1

Ubuntu 16.04 LTS:
openjdk-8-jdk 8u212-b03-0ubuntu1.16.04.1
openjdk-8-jdk-headless 8u212-b03-0ubuntu1.16.04.1
openjdk-8-jre 8u212-b03-0ubuntu1.16.04.1
openjdk-8-jre-headless 8u212-b03-0ubuntu1.16.04.1
openjdk-8-jre-jamvm 8u212-b03-0ubuntu1.16.04.1

This update uses a new upstream release, which includes additional bug
fixes. After a standard system update you need to restart any Java
applications or applets to make all the necessary changes.

References:
https://usn.ubuntu.com/usn/usn-3975-1
CVE-2019-2602, CVE-2019-2684, CVE-2019-2697, CVE-2019-2698

Package Information:
https://launchpad.net/ubuntu/+source/openjdk-lts/11.0.3+7-1ubuntu2~19.04.1
https://launchpad.net/ubuntu/+source/openjdk-lts/11.0.3+7-1ubuntu2~18.10.1
https://launchpad.net/ubuntu/+source/openjdk-lts/11.0.3+7-1ubuntu2~18.04.1
https://launchpad.net/ubuntu/+source/openjdk-8/8u212-b03-0ubuntu1.16.04.1

—–BEGIN PGP SIGNATURE—–
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=3hkK
—–END PGP SIGNATURE—–

AutorToni Vugdelija
Cert idNCERT-REF-2019-05-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostaci programskog paketa VCFtools

Otkriveni su sigurnosni nedostaci u programskom paketu VCFtools za operacijski sustav Ubuntu. Otkriveni nedostaci potencijalnim napadačima omogućuju izazivanje DoS stanja....

Close