USN-4083-1

Source
https://ubuntu.com/security/notices/USN-4083-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4083-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-4083-1
Related
Published
2019-07-31T17:10:35.804874Z
Modified
2019-07-31T17:10:35.804874Z
Summary
openjdk-lts vulnerabilities
Details

It was discovered that OpenJDK did not sufficiently validate serial streams before deserializing suppressed exceptions in some situations. An attacker could use this to specially craft an object that, when deserialized, would cause a denial of service. (CVE-2019-2762)

It was discovered that in some situations OpenJDK did not properly bound the amount of memory allocated during object deserialization. An attacker could use this to specially craft an object that, when deserialized, would cause a denial of service (excessive memory consumption). (CVE-2019-2769)

It was discovered that OpenJDK did not properly restrict privileges in certain situations. An attacker could use this to specially construct an untrusted Java application or applet that could escape sandbox restrictions. (CVE-2019-2786)

Jonathan Birch discovered that the Networking component of OpenJDK did not properly validate URLs in some situations. An attacker could use this to bypass restrictions on characters in URLs. (CVE-2019-2816)

It was discovered that the ChaCha20Cipher implementation in OpenJDK did not use constant time computations in some situations. An attacker could use this to expose sensitive information. (CVE-2019-2818)

It was discovered that the Java Secure Socket Extension (JSSE) component in OpenJDK did not properly handle OCSP stapling messages during TLS handshake in some situations. An attacker could use this to expose sensitive information. (CVE-2019-2821)

It was discovered that OpenJDK incorrectly handled certain memory operations. If a user or automated system were tricked into opening a specially crafted PNG file, a remote attacker could use this issue to cause OpenJDK to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2019-7317)

References

Affected packages

Ubuntu:18.04:LTS / openjdk-lts

Package

Name
openjdk-lts
Purl
pkg:deb/ubuntu/openjdk-lts?arch=src?distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
11.0.4+11-1ubuntu2~18.04.3

Affected versions

9.*

9.0.4+12-2ubuntu4
9.0.4+12-4ubuntu1

Other

10~46-4ubuntu1
10~46-5ubuntu1

10.*

10.0.1+10-1ubuntu2
10.0.1+10-3ubuntu1
10.0.2+13-1ubuntu0.18.04.1
10.0.2+13-1ubuntu0.18.04.2
10.0.2+13-1ubuntu0.18.04.3
10.0.2+13-1ubuntu0.18.04.4

11.*

11.0.2+9-3ubuntu1~18.04.3
11.0.3+7-1ubuntu2~18.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "11.0.4+11-1ubuntu2~18.04.3",
            "binary_name": "openjdk-11-dbg"
        },
        {
            "binary_version": "11.0.4+11-1ubuntu2~18.04.3",
            "binary_name": "openjdk-11-demo"
        },
        {
            "binary_version": "11.0.4+11-1ubuntu2~18.04.3",
            "binary_name": "openjdk-11-doc"
        },
        {
            "binary_version": "11.0.4+11-1ubuntu2~18.04.3",
            "binary_name": "openjdk-11-jdk"
        },
        {
            "binary_version": "11.0.4+11-1ubuntu2~18.04.3",
            "binary_name": "openjdk-11-jdk-headless"
        },
        {
            "binary_version": "11.0.4+11-1ubuntu2~18.04.3",
            "binary_name": "openjdk-11-jre"
        },
        {
            "binary_version": "11.0.4+11-1ubuntu2~18.04.3",
            "binary_name": "openjdk-11-jre-headless"
        },
        {
            "binary_version": "11.0.4+11-1ubuntu2~18.04.3",
            "binary_name": "openjdk-11-jre-zero"
        },
        {
            "binary_version": "11.0.4+11-1ubuntu2~18.04.3",
            "binary_name": "openjdk-11-source"
        }
    ]
}