CVE-2019-2842 (retired)

Priority
Description
Vulnerability in the Java SE component of Oracle Java SE (subcomponent:
JCE). The supported version that is affected is Java SE: 8u212. Difficult
to exploit vulnerability allows unauthenticated attacker with network
access via multiple protocols to compromise Java SE. Successful attacks of
this vulnerability can result in unauthorized ability to cause a partial
denial of service (partial DOS) of Java SE. Note: This vulnerability
applies to Java deployments, typically in clients running sandboxed Java
Web Start applications or sandboxed Java applets (in Java SE 8), that load
and run untrusted code (e.g., code that comes from the internet) and rely
on the Java sandbox for security. This vulnerability can also be exploited
by using APIs in the specified Component, e.g., through a web service which
supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts).
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
Ubuntu-Description
Nati Nimni discovered that the Java Cryptography Extension component in
OpenJDK did not properly perform array bounds checking in some situations. An
attacker could use this to cause a denial of service.
Package
Upstream:released (8u222-b10-1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):released (8u222-b10-1ubuntu1~16.04.1)
Ubuntu 18.04 LTS (Bionic Beaver):released (8u222-b10-1ubuntu1~18.04.1)
Ubuntu 19.04 (Disco Dingo):released (8u222-b10-1ubuntu1~19.04.1)
Ubuntu 19.10 (Eoan):not-affected (8u222-b10-1ubuntu2)
Patches:
Upstream:https://github.com/AdoptOpenJDK/openjdk-jdk8u/commit/6de43a1bd536d230b915094dcc5cafd48205ffb4
More Information

Updated: 2019-08-14 14:15:54 UTC (commit b248f28b2baec34efa2d1f7c325411e21dec9937)