CVE-2019-2821

Priority
Description
Vulnerability in the Java SE component of Oracle Java SE (subcomponent:
JSSE). Supported versions that are affected are Java SE: 11.0.3 and 12.0.1.
Difficult to exploit vulnerability allows unauthenticated attacker with
network access via TLS to compromise Java SE. Successful attacks require
human interaction from a person other than the attacker. Successful attacks
of this vulnerability can result in unauthorized access to critical data or
complete access to all Java SE accessible data. Note: This vulnerability
applies to Java deployments, typically in clients running sandboxed Java
Web Start applications or sandboxed Java applets (in Java SE 8), that load
and run untrusted code (e.g., code that comes from the internet) and rely
on the Java sandbox for security. This vulnerability does not apply to Java
deployments, typically in servers, that load and run only trusted code
(e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3
(Confidentiality impacts). CVSS Vector:
(CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N).
Ubuntu-Description
It was discovered that the Java Secure Socket Extension (JSSE)
component in OpenJDK did not properly handle OCSP stapling messages
during TLS handshake in some situations. An attacker could use this
to expose sensitive information.
Package
Upstream:released (12.0.2+9-1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Ubuntu 18.04 LTS (Bionic Beaver):DNE
Ubuntu 19.04 (Disco Dingo):needs-triage
Ubuntu 19.10 (Eoan):needs-triage
Package
Upstream:released (11.0.4+11-1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Ubuntu 18.04 LTS (Bionic Beaver):released (11.0.4+11-1ubuntu2~18.04.3)
Ubuntu 19.04 (Disco Dingo):released (11.0.4+11-1ubuntu2~19.04)
Ubuntu 19.10 (Eoan):released (11.0.4+11-1ubuntu2)
Patches:
Upstream:http://hg.openjdk.java.net/jdk-updates/jdk11u/rev/6a4d57474e1c
More Information

Updated: 2019-08-08 12:14:23 UTC (commit a33e2c21f04eea2ea6679d41bcbf41f35903d3fc)