==========================================================================
Ubuntu Security Notice USN-3949-1
April 16, 2019
openjdk-lts vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 18.04 LTS
Summary:
Java applets or applications could be made to expose sensitive
information.
Software Description:
– openjdk-lts: Open Source Java implementation
Details:
It was discovered that a memory disclosure issue existed in the OpenJDK
Library subsystem. An attacker could use this to expose sensitive
information and possibly bypass Java sandbox restrictions. (CVE-2019-2422)
Please note that with this update, the OpenJDK package in Ubuntu
18.04 LTS has transitioned from OpenJDK 10 to OpenJDK 11. Several
additional packages were updated to be compatible with OpenJDK 11.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 18.04 LTS:
openjdk-11-jdk 11.0.2+9-3ubuntu1~18.04.3
openjdk-11-jre 11.0.2+9-3ubuntu1~18.04.3
This update uses a new upstream release, which includes additional bug
fixes. After a standard system update you need to restart any Java
applications or applets to make all the necessary changes.
References:
https://usn.ubuntu.com/usn/usn-3949-1
CVE-2019-2422
Package Information:
https://launchpad.net/ubuntu/+source/openjdk-lts/11.0.2+9-3ubuntu1~18.04.3
—–BEGIN PGP SIGNATURE—–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=W+O0
—–END PGP SIGNATURE—–
—