USN-3875-1: OpenJDK vulnerability
30 January 2019
Java applets or applications could be made to expose sensitive information.
Releases
Packages
- openjdk-8 - Open Source Java implementation
- openjdk-lts - Open Source Java implementation
Details
It was discovered that a memory disclosure issue existed in the OpenJDK
Library subsystem. An attacker could use this to expose sensitive
information and possibly bypass Java sandbox restrictions. (CVE-2019-2422)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 18.10
-
openjdk-11-jdk
-
11.0.1+13-3ubuntu3.18.10.1
-
openjdk-11-jre
-
11.0.1+13-3ubuntu3.18.10.1
-
openjdk-11-jre-headless
-
11.0.1+13-3ubuntu3.18.10.1
Ubuntu 16.04
-
openjdk-8-jdk
-
8u191-b12-2ubuntu0.16.04.1
-
openjdk-8-jre
-
8u191-b12-2ubuntu0.16.04.1
-
openjdk-8-jre-headless
-
8u191-b12-2ubuntu0.16.04.1
-
openjdk-8-jre-jamvm
-
8u191-b12-2ubuntu0.16.04.1
This update uses a new upstream release, which includes additional bug
fixes. After a standard system update you need to restart any Java
applications or applets to make all the necessary changes.
References
Related notices
- USN-3942-1: openjdk-7-jdk, openjdk-7-jre-lib, openjdk-7-jre-headless, openjdk-7-doc, icedtea-7-jre-jamvm, openjdk-7-jre, openjdk-7-jre-zero, openjdk-7-demo, openjdk-7-tests, openjdk-7, openjdk-7-source
- USN-3949-1: openjdk-lts, openjdk-11-jdk, openjdk-11-doc, openjdk-11-jre-headless, openjdk-11-jre, openjdk-11-jre-zero, openjdk-11-jdk-headless, openjdk-11-demo, openjdk-11-source