Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.844116
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-4080-1)
Summary:The remote host is missing an update for the 'openjdk-8' package(s) announced via the USN-4080-1 advisory.
Description:Summary:
The remote host is missing an update for the 'openjdk-8' package(s) announced via the USN-4080-1 advisory.

Vulnerability Insight:
Keegan Ryan discovered that the ECC implementation in OpenJDK was not
sufficiently resilient to side-channel attacks. An attacker could possibly
use this to expose sensitive information. (CVE-2019-2745)

It was discovered that OpenJDK did not sufficiently validate serial streams
before deserializing suppressed exceptions in some situations. An attacker
could use this to specially craft an object that, when deserialized, would
cause a denial of service. (CVE-2019-2762)

It was discovered that in some situations OpenJDK did not properly bound
the amount of memory allocated during object deserialization. An attacker
could use this to specially craft an object that, when deserialized, would
cause a denial of service (excessive memory consumption). (CVE-2019-2769)

It was discovered that OpenJDK did not properly restrict privileges in
certain situations. An attacker could use this to specially construct an
untrusted Java application or applet that could escape sandbox
restrictions. (CVE-2019-2786)

Jonathan Birch discovered that the Networking component of OpenJDK did not
properly validate URLs in some situations. An attacker could use this to
bypass restrictions on characters in URLs. (CVE-2019-2816)

Nati Nimni discovered that the Java Cryptography Extension component in
OpenJDK did not properly perform array bounds checking in some situations.
An attacker could use this to cause a denial of service. (CVE-2019-2842)

It was discovered that OpenJDK incorrectly handled certain memory
operations. If a user or automated system were tricked into opening a
specially crafted PNG file, a remote attacker could use this issue to
cause OpenJDK to crash, resulting in a denial of service, or possibly
execute arbitrary code. (CVE-2019-7317)

Affected Software/OS:
'openjdk-8' package(s) on Ubuntu 16.04.

Solution:
Please install the updated package(s).

CVSS Score:
5.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:N

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2019-2745
http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://lists.debian.org/debian-lts-announce/2019/08/msg00020.html
SuSE Security Announcement: openSUSE-SU-2019:1912 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00044.html
SuSE Security Announcement: openSUSE-SU-2019:1916 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00038.html
https://usn.ubuntu.com/4080-1/
Common Vulnerability Exposure (CVE) ID: CVE-2019-2762
RedHat Security Advisories: RHSA-2019:2494
https://access.redhat.com/errata/RHSA-2019:2494
RedHat Security Advisories: RHSA-2019:2495
https://access.redhat.com/errata/RHSA-2019:2495
RedHat Security Advisories: RHSA-2019:2585
https://access.redhat.com/errata/RHSA-2019:2585
RedHat Security Advisories: RHSA-2019:2590
https://access.redhat.com/errata/RHSA-2019:2590
RedHat Security Advisories: RHSA-2019:2592
https://access.redhat.com/errata/RHSA-2019:2592
RedHat Security Advisories: RHSA-2019:2737
https://access.redhat.com/errata/RHSA-2019:2737
https://usn.ubuntu.com/4083-1/
Common Vulnerability Exposure (CVE) ID: CVE-2019-2769
Common Vulnerability Exposure (CVE) ID: CVE-2019-2786
Common Vulnerability Exposure (CVE) ID: CVE-2019-2816
Common Vulnerability Exposure (CVE) ID: CVE-2019-2842
Common Vulnerability Exposure (CVE) ID: CVE-2019-7317
BugTraq ID: 108098
http://www.securityfocus.com/bid/108098
Bugtraq: 20190417 [slackware-security] libpng (SSA:2019-107-01) (Google Search)
https://seclists.org/bugtraq/2019/Apr/30
Bugtraq: 20190429 [SECURITY] [DSA 4435-1] libpng1.6 security update (Google Search)
https://seclists.org/bugtraq/2019/Apr/36
Bugtraq: 20190522 [slackware-security] mozilla-firefox (SSA:2019-141-01) (Google Search)
https://seclists.org/bugtraq/2019/May/56
Bugtraq: 20190523 [SECURITY] [DSA 4448-1] firefox-esr security update (Google Search)
https://seclists.org/bugtraq/2019/May/59
Bugtraq: 20190527 [SECURITY] [DSA 4451-1] thunderbird security update (Google Search)
https://seclists.org/bugtraq/2019/May/67
https://security.netapp.com/advisory/ntap-20190719-0005/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03977en_us
Debian Security Information: DSA-4435 (Google Search)
https://www.debian.org/security/2019/dsa-4435
Debian Security Information: DSA-4448 (Google Search)
https://www.debian.org/security/2019/dsa-4448
Debian Security Information: DSA-4451 (Google Search)
https://www.debian.org/security/2019/dsa-4451
https://security.gentoo.org/glsa/201908-02
http://packetstormsecurity.com/files/152561/Slackware-Security-Advisory-libpng-Updates.html
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=12803
https://github.com/glennrp/libpng/issues/275
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://lists.debian.org/debian-lts-announce/2019/05/msg00032.html
https://lists.debian.org/debian-lts-announce/2019/05/msg00038.html
RedHat Security Advisories: RHSA-2019:1265
https://access.redhat.com/errata/RHSA-2019:1265
RedHat Security Advisories: RHSA-2019:1267
https://access.redhat.com/errata/RHSA-2019:1267
RedHat Security Advisories: RHSA-2019:1269
https://access.redhat.com/errata/RHSA-2019:1269
RedHat Security Advisories: RHSA-2019:1308
https://access.redhat.com/errata/RHSA-2019:1308
RedHat Security Advisories: RHSA-2019:1309
https://access.redhat.com/errata/RHSA-2019:1309
RedHat Security Advisories: RHSA-2019:1310
https://access.redhat.com/errata/RHSA-2019:1310
SuSE Security Announcement: openSUSE-SU-2019:1484 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00002.html
SuSE Security Announcement: openSUSE-SU-2019:1534 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00029.html
SuSE Security Announcement: openSUSE-SU-2019:1664 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00084.html
https://usn.ubuntu.com/3962-1/
https://usn.ubuntu.com/3991-1/
https://usn.ubuntu.com/3997-1/
CopyrightCopyright (C) 2019 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.