[USN-3875-1] OpenJDK vulnerability

protocol=”application/pgp-signature”; boundary=”DSayHWYpDlRfCAAQ”
Content-Disposition: inline

–DSayHWYpDlRfCAAQ

Content-Disposition: inline

==========================================================================
Ubuntu Security Notice USN-3875-1
January 30, 2019

openjdk-8, openjdk-lts vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 18.10
– Ubuntu 16.04 LTS

Summary:

Java applets or applications could be made to expose sensitive
information.

Software Description:
– openjdk-lts: Open Source Java implementation
– openjdk-8: Open Source Java implementation

Details:

It was discovered that a memory disclosure issue existed in the OpenJDK
Library subsystem. An attacker could use this to expose sensitive
information and possibly bypass Java sandbox restrictions. (CVE-2019-2422)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.10:
openjdk-11-jdk 11.0.1+13-3ubuntu3.18.10.1
openjdk-11-jre 11.0.1+13-3ubuntu3.18.10.1
openjdk-11-jre-headless 11.0.1+13-3ubuntu3.18.10.1

Ubuntu 16.04 LTS:
openjdk-8-jdk 8u191-b12-2ubuntu0.16.04.1
openjdk-8-jre 8u191-b12-2ubuntu0.16.04.1
openjdk-8-jre-headless 8u191-b12-2ubuntu0.16.04.1
openjdk-8-jre-jamvm 8u191-b12-2ubuntu0.16.04.1

This update uses a new upstream release, which includes additional bug
fixes. After a standard system update you need to restart any Java
applications or applets to make all the necessary changes.

References:
https://usn.ubuntu.com/usn/usn-3875-1
CVE-2019-2422

Package Information:
https://launchpad.net/ubuntu/+source/openjdk-lts/11.0.1+13-3ubuntu3.18.10.1
https://launchpad.net/ubuntu/+source/openjdk-8/8u191-b12-2ubuntu0.16.04.1

–DSayHWYpDlRfCAAQ

—–BEGIN PGP SIGNATURE—–
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=0r0J
—–END PGP SIGNATURE—–

–DSayHWYpDlRfCAAQ–

MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK