CVE-2019-2745

Priority
Description
Vulnerability in the Java SE component of Oracle Java SE (subcomponent:
Security). Supported versions that are affected are Java SE: 7u221, 8u212
and 11.0.3. Difficult to exploit vulnerability allows unauthenticated
attacker with logon to the infrastructure where Java SE executes to
compromise Java SE. Successful attacks of this vulnerability can result in
unauthorized access to critical data or complete access to all Java SE
accessible data. Note: This vulnerability applies to Java deployments,
typically in clients running sandboxed Java Web Start applications or
sandboxed Java applets (in Java SE 8), that load and run untrusted code
(e.g., code that comes from the internet) and rely on the Java sandbox for
security. This vulnerability can also be exploited by using APIs in the
specified Component, e.g., through a web service which supplies data to the
APIs. CVSS 3.0 Base Score 5.1 (Confidentiality impacts). CVSS Vector:
(CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).
Ubuntu-Description
Keegan Ryan discovered that the ECC implementation in OpenJDK was not
sufficiently resilient to side-channel attacks. An attacker could
possibly use this to expose sensitive information.
Notes
sbeattiepossibly does not affect openjdk-12
Package
Upstream:needs-triage
Ubuntu 18.04 LTS:DNE
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:released (8u222-b10-1)
Ubuntu 18.04 LTS:released (8u222-b10-1ubuntu1~18.04.1)
Ubuntu 16.04 ESM:released (8u222-b10-1ubuntu1~16.04.1)
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:released (11.0.4+11-1)
Ubuntu 18.04 LTS:released (11.0.4+11-1ubuntu2~18.04.3)
Ubuntu 14.04 ESM:DNE
Patches:
Upstream:http://hg.openjdk.java.net/jdk-updates/jdk11u/rev/640251cdca05
Upstream:http://hg.openjdk.java.net/jdk-updates/jdk11u/rev/542feedcfedd
More Information

Updated: 2022-04-13 13:54:14 UTC (commit f411bd370d482ef4385c4e751d121a4055fbc009)