exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Ubuntu Security Notice USN-4223-1

Ubuntu Security Notice USN-4223-1
Posted Dec 18, 2019
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4223-1 - Jan Jancar, Petr Svenda, and Vladimir Sedlacek discovered that a side- channel vulnerability existed in the ECDSA implementation in OpenJDK. An Attacker could use this to expose sensitive information. It was discovered that the Socket implementation in OpenJDK did not properly restrict the creation of subclasses with a custom Socket implementation. An attacker could use this to specially create a Java class that could possibly bypass Java sandbox restrictions. Various other issues were also addressed.

tags | advisory, java
systems | linux, ubuntu
advisories | CVE-2019-2894, CVE-2019-2945, CVE-2019-2949, CVE-2019-2962, CVE-2019-2964, CVE-2019-2975, CVE-2019-2977, CVE-2019-2978, CVE-2019-2981, CVE-2019-2983, CVE-2019-2987, CVE-2019-2988, CVE-2019-2989, CVE-2019-2992, CVE-2019-2999
SHA-256 | 3e331b7ac5ae58746f0340a4b804d07d2cca4361bab05931f9b147f931602d1c

Ubuntu Security Notice USN-4223-1

Change Mirror Download
=========================================================================
Ubuntu Security Notice USN-4223-1
December 17, 2019

openjdk-8, openjdk-lts vulnerabilities
=========================================================================
A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 19.10
- Ubuntu 19.04
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS

Summary:

Several security issues were fixed in OpenJDK.

Software Description:
- openjdk-lts: Open Source Java implementation
- openjdk-8: Open Source Java implementation

Details:

Jan Jancar, Petr Svenda, and Vladimir Sedlacek discovered that a side-
channel vulnerability existed in the ECDSA implementation in OpenJDK. An
Attacker could use this to expose sensitive information. (CVE-2019-2894)

It was discovered that the Socket implementation in OpenJDK did not
properly restrict the creation of subclasses with a custom Socket
implementation. An attacker could use this to specially create a Java class
that could possibly bypass Java sandbox restrictions. (CVE-2019-2945)

Rob Hamm discovered that the Kerberos implementation in OpenJDK did not
properly handle proxy credentials. An attacker could possibly use this to
impersonate another user. (CVE-2019-2949)

It was discovered that a NULL pointer dereference existed in the font
handling implementation in OpenJDK. An attacker could use this to cause a
denial of service (application crash). (CVE-2019-2962)

It was discovered that the Concurrency subsystem in OpenJDK did not
properly bound stack consumption when compiling regular expressions. An
attacker could use this to cause a denial of service (application crash).
(CVE-2019-2964)

It was discovered that the JAXP subsystem in OpenJDK did not properly
handle XPath expressions in some situations. An attacker could use this to
cause a denial of service (application crash). (CVE-2019-2973,
CVE-2019-2981)

It was discovered that the Nashorn JavaScript subcomponent in OpenJDK did
not properly handle regular expressions in some situations. An attacker
could use this to cause a denial of service (application crash).
(CVE-2019-2975)

It was discovered that the String class in OpenJDK contained an out-of-
bounds access vulnerability. An attacker could use this to cause a denial
of service (application crash) or possibly expose sensitive information.
This issue only affected OpenJDK 11 in Ubuntu 18.04 LTS, Ubuntu 19.04,
and Ubuntu 19.10. (CVE-2019-2977)

It was discovered that the Jar URL handler in OpenJDK did not properly
handled nested Jar URLs in some situations. An attacker could use this to
cause a denial of service (application crash). (CVE-2019-2978)

It was discovered that the Serialization component of OpenJDK did not
properly handle deserialization of certain object attributes. An attacker
could use this to cause a denial of service (application crash).
(CVE-2019-2983)

It was discovered that the FreetypeFontScaler class in OpenJDK did not
properly validate dimensions of glyph bitmap images read from font files.
An attacker could specially craft a font file that could cause a denial of
service (application crash). (CVE-2019-2987)

It was discovered that a buffer overflow existed in the SunGraphics2D class
in OpenJDK. An attacker could possibly use this to cause a denial of
service (excessive memory consumption or application crash).
(CVE-2019-2988)

It was discovered that the Networking component in OpenJDK did not properly
handle certain responses from HTTP proxies. An attacker controlling a
malicious HTTP proxy could possibly use this to inject content into a
proxied HTTP connection. (CVE-2019-2989)

It was discovered that the font handling implementation in OpenJDK did not
properly validate TrueType font files in some situations. An attacker could
specially craft a font file that could cause a denial of service (excessive
memory consumption). (CVE-2019-2992)

It was discovered that the JavaDoc generator in OpenJDK did not properly
filter out some HTML elements properly, including documentation comments in
Java source code. An attacker could possibly use this to craft a Cross-Site
Scripting attack. (CVE-2019-2999)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 19.10:
openjdk-11-jdk 11.0.5+10-0ubuntu1.1
openjdk-11-jre 11.0.5+10-0ubuntu1.1
openjdk-11-jre-headless 11.0.5+10-0ubuntu1.1
openjdk-11-jre-zero 11.0.5+10-0ubuntu1.1

Ubuntu 19.04:
openjdk-11-jdk 11.0.5+10-0ubuntu1.1~19.04
openjdk-11-jre 11.0.5+10-0ubuntu1.1~19.04
openjdk-11-jre-headless 11.0.5+10-0ubuntu1.1~19.04
openjdk-11-jre-zero 11.0.5+10-0ubuntu1.1~19.04

Ubuntu 18.04 LTS:
openjdk-11-jdk 11.0.5+10-0ubuntu1.1~18.04
openjdk-11-jre 11.0.5+10-0ubuntu1.1~18.04
openjdk-11-jre-headless 11.0.5+10-0ubuntu1.1~18.04
openjdk-11-jre-zero 11.0.5+10-0ubuntu1.1~18.04

Ubuntu 16.04 LTS:
openjdk-8-jdk 8u232-b09-0ubuntu1~16.04.1
openjdk-8-jre 8u232-b09-0ubuntu1~16.04.1
openjdk-8-jre-headless 8u232-b09-0ubuntu1~16.04.1
openjdk-8-jre-jamvm 8u232-b09-0ubuntu1~16.04.1
openjdk-8-jre-zero 8u232-b09-0ubuntu1~16.04.1

This update uses a new upstream release, which includes additional bug
fixes. After a standard system update you need to restart any Java
applications or applets to make all the necessary changes.

References:
https://usn.ubuntu.com/4223-1
CVE-2019-2894, CVE-2019-2945, CVE-2019-2949, CVE-2019-2962,
CVE-2019-2964, CVE-2019-2973, CVE-2019-2975, CVE-2019-2977,
CVE-2019-2978, CVE-2019-2981, CVE-2019-2983, CVE-2019-2987,
CVE-2019-2988, CVE-2019-2989, CVE-2019-2992, CVE-2019-2999

Package Information:
https://launchpad.net/ubuntu/+source/openjdk-lts/11.0.5+10-0ubuntu1.1
https://launchpad.net/ubuntu/+source/openjdk-lts/11.0.5+10-0ubuntu1.1~19.04
https://launchpad.net/ubuntu/+source/openjdk-lts/11.0.5+10-0ubuntu1.1~18.04
https://launchpad.net/ubuntu/+source/openjdk-8/8u232-b09-0ubuntu1~16.04.1
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    69 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close