==========================================================================
Ubuntu Security Notice USN-3875-1
January 30, 2019
openjdk-8, openjdk-lts vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 18.10
– Ubuntu 16.04 LTS
Summary:
Java applets or applications could be made to expose sensitive
information.
Software Description:
– openjdk-lts: Open Source Java implementation
– openjdk-8: Open Source Java implementation
Details:
It was discovered that a memory disclosure issue existed in the OpenJDK
Library subsystem. An attacker could use this to expose sensitive
information and possibly bypass Java sandbox restrictions. (CVE-2019-2422)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 18.10:
openjdk-11-jdk 11.0.1+13-3ubuntu3.18.10.1
openjdk-11-jre 11.0.1+13-3ubuntu3.18.10.1
openjdk-11-jre-headless 11.0.1+13-3ubuntu3.18.10.1
Ubuntu 16.04 LTS:
openjdk-8-jdk 8u191-b12-2ubuntu0.16.04.1
openjdk-8-jre 8u191-b12-2ubuntu0.16.04.1
openjdk-8-jre-headless 8u191-b12-2ubuntu0.16.04.1
openjdk-8-jre-jamvm 8u191-b12-2ubuntu0.16.04.1
This update uses a new upstream release, which includes additional bug
fixes. After a standard system update you need to restart any Java
applications or applets to make all the necessary changes.
References:
https://usn.ubuntu.com/usn/usn-3875-1
CVE-2019-2422
Package Information:
https://launchpad.net/ubuntu/+source/openjdk-lts/11.0.1+13-3ubuntu3.18.10.1
https://launchpad.net/ubuntu/+source/openjdk-8/8u191-b12-2ubuntu0.16.04.1
—–BEGIN PGP SIGNATURE—–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=0r0J
—–END PGP SIGNATURE—–
—