USN-3949-1: OpenJDK 11 vulnerability

Publication date

16 April 2019

Overview

Java applets or applications could be made to expose sensitive information.

Releases


Packages

Details

It was discovered that a memory disclosure issue existed in the OpenJDK
Library subsystem. An attacker could use this to expose sensitive
information and possibly bypass Java sandbox restrictions. (CVE-2019-2422)

Please note that with this update, the OpenJDK package in Ubuntu
18.04 LTS has transitioned from OpenJDK 10 to OpenJDK 11. Several
additional packages were updated to be compatible with OpenJDK 11.

It was discovered that a memory disclosure issue existed in the OpenJDK
Library subsystem. An attacker could use this to expose sensitive
information and possibly bypass Java sandbox restrictions. (CVE-2019-2422)

Please note that with this update, the OpenJDK package in Ubuntu
18.04 LTS has transitioned from OpenJDK 10 to OpenJDK 11. Several
additional packages were updated to be compatible with OpenJDK 11.

Update instructions

This update uses a new upstream release, which includes additional bug fixes. After a standard system update you need to restart any Java applications or applets to make all the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
18.04 bionic openjdk-11-jdk –  11.0.2+9-3ubuntu1~18.04.3
openjdk-11-jre –  11.0.2+9-3ubuntu1~18.04.3

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›