CVE-2019-2769

Priority
Description
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE
(subcomponent: Utilities). Supported versions that are affected are Java
SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Easily
exploitable vulnerability allows unauthenticated attacker with network
access via multiple protocols to compromise Java SE, Java SE Embedded.
Successful attacks of this vulnerability can result in unauthorized ability
to cause a partial denial of service (partial DOS) of Java SE, Java SE
Embedded. Note: This vulnerability applies to Java deployments, typically
in clients running sandboxed Java Web Start applications or sandboxed Java
applets (in Java SE 8), that load and run untrusted code (e.g., code that
comes from the internet) and rely on the Java sandbox for security. This
vulnerability can also be exploited by using APIs in the specified
Component, e.g., through a web service which supplies data to the APIs.
CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector:
(CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Ubuntu-Description
It was discovered that in some situations OpenJDK did not properly
bound the amount of memory allocated during object deserialization. An
attacker could use this to specially craft an object that, when
deserialized, would cause a denial of service (excessive memory
consumption).
Notes
Package
Upstream:released (12.0.2+9-1)
Ubuntu 18.04 LTS:DNE
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:needs-triage
Ubuntu 18.04 LTS:DNE
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:released (8u222-b10-1)
Ubuntu 18.04 LTS:released (8u222-b10-1ubuntu1~18.04.1)
Ubuntu 16.04 ESM:released (8u222-b10-1ubuntu1~16.04.1)
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:released (11.0.4+11-1)
Ubuntu 18.04 LTS:released (11.0.4+11-1ubuntu2~18.04.3)
Ubuntu 14.04 ESM:DNE
Patches:
Upstream:http://hg.openjdk.java.net/jdk-updates/jdk11u/rev/7c3a12bd9c72
More Information

Updated: 2022-04-13 13:54:15 UTC (commit f411bd370d482ef4385c4e751d121a4055fbc009)