{"id":"USN-3804-1","summary":"openjdk-8, openjdk-lts vulnerabilities","details":"It was discovered that the Security component of OpenJDK did not properly\nensure that manifest elements were signed before use. An attacker could\npossibly use this to specially construct an untrusted Java application or\napplet that could escape sandbox restrictions. (CVE-2018-3136)\n\nArtem Smotrakov discovered that the HTTP client redirection handler\nimplementation in OpenJDK did not clear potentially sensitive information\nin HTTP headers when following redirections to different hosts. An attacker\ncould use this to expose sensitive information. (CVE-2018-3139)\n\nIt was discovered that the Java Naming and Directory Interface (JNDI)\nimplementation in OpenJDK did not properly enforce restrictions specified\nby system properties in some situations. An attacker could potentially use\nthis to execute arbitrary code. (CVE-2018-3149)\n\nIt was discovered that the Utility component of OpenJDK did not properly\nensure all attributes in a JAR were signed before use. An attacker could\nuse this to specially construct an untrusted Java application or applet\nthat could escape sandbox restrictions. This issue only affected Ubuntu\n18.04 LTS and Ubuntu 18.10. (CVE-2018-3150)\n\nIt was discovered that the Hotspot component of OpenJDK did not properly\nperform access checks in certain cases when performing field link\nresolution. An attacker could use this to specially construct an untrusted\nJava application or applet that could escape sandbox restrictions.\n(CVE-2018-3169)\n\nFelix Dörre discovered that the Java Secure Socket Extension (JSSE)\nimplementation in OpenJDK did not ensure that the same endpoint\nidentification algorithm was used during TLS session resumption as during\ninitial session setup. An attacker could use this to expose sensitive\ninformation. (CVE-2018-3180)\n\nKrzysztof Szafrański discovered that the Scripting component did not\nproperly restrict access to the scripting engine in some situations. An\nattacker could use this to specially construct an untrusted Java\napplication or applet that could escape sandbox restrictions.\n(CVE-2018-3183)\n\nTobias Ospelt discovered that the Resource Interchange File Format (RIFF)\nreader implementation in OpenJDK contained an infinite loop. An attacker\ncould use this to cause a denial of service. This issue only affected\nUbuntu 16.04 LTS. (CVE-2018-3214)\n","modified":"2026-02-10T04:41:26Z","published":"2018-10-30T19:37:40Z","related":["UBUNTU-CVE-2018-3136","UBUNTU-CVE-2018-3139","UBUNTU-CVE-2018-3149","UBUNTU-CVE-2018-3150","UBUNTU-CVE-2018-3169","UBUNTU-CVE-2018-3180","UBUNTU-CVE-2018-3183","UBUNTU-CVE-2018-3214"],"upstream":["CVE-2018-3136","CVE-2018-3139","CVE-2018-3149","CVE-2018-3150","CVE-2018-3169","CVE-2018-3180","CVE-2018-3183","CVE-2018-3214","UBUNTU-CVE-2018-3136","UBUNTU-CVE-2018-3139","UBUNTU-CVE-2018-3149","UBUNTU-CVE-2018-3150","UBUNTU-CVE-2018-3169","UBUNTU-CVE-2018-3180","UBUNTU-CVE-2018-3183","UBUNTU-CVE-2018-3214"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3804-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-3136"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-3139"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-3149"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-3150"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-3169"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-3180"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-3183"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-3214"}],"affected":[{"package":{"name":"openjdk-8","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/openjdk-8@8u181-b13-1ubuntu0.16.04.1?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8u181-b13-1ubuntu0.16.04.1"}]}],"versions":["8u66-b01-5","8u72-b05-1ubuntu1","8u72-b05-5","8u72-b05-6","8u72-b15-1","8u72-b15-2ubuntu1","8u72-b15-2ubuntu3","8u72-b15-3ubuntu1","8u77-b03-1ubuntu2","8u77-b03-3ubuntu1","8u77-b03-3ubuntu2","8u77-b03-3ubuntu3","8u91-b14-0ubuntu4~16.04.1","8u91-b14-3ubuntu1~16.04.1","8u111-b14-2ubuntu0.16.04.2","8u121-b13-0ubuntu1.16.04.2","8u131-b11-0ubuntu1.16.04.2","8u131-b11-2ubuntu1.16.04.2","8u131-b11-2ubuntu1.16.04.3","8u151-b12-0ubuntu0.16.04.2","8u162-b12-0ubuntu0.16.04.2","8u171-b11-0ubuntu0.16.04.1","8u181-b13-0ubuntu0.16.04.1"],"ecosystem_specific":{"binaries":[{"binary_version":"8u181-b13-1ubuntu0.16.04.1","binary_name":"openjdk-8-demo"},{"binary_version":"8u181-b13-1ubuntu0.16.04.1","binary_name":"openjdk-8-jdk"},{"binary_version":"8u181-b13-1ubuntu0.16.04.1","binary_name":"openjdk-8-jdk-headless"},{"binary_version":"8u181-b13-1ubuntu0.16.04.1","binary_name":"openjdk-8-jre"},{"binary_version":"8u181-b13-1ubuntu0.16.04.1","binary_name":"openjdk-8-jre-headless"},{"binary_version":"8u181-b13-1ubuntu0.16.04.1","binary_name":"openjdk-8-jre-jamvm"},{"binary_version":"8u181-b13-1ubuntu0.16.04.1","binary_name":"openjdk-8-jre-zero"},{"binary_version":"8u181-b13-1ubuntu0.16.04.1","binary_name":"openjdk-8-source"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3804-1.json","cves_map":{"cves":[{"id":"CVE-2018-3136","severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2018-3139","severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2018-3149","severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2018-3169","severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2018-3180","severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2018-3183","severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2018-3214","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:16.04:LTS"}}},{"package":{"name":"openjdk-lts","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/openjdk-lts@10.0.2+13-1ubuntu0.18.04.3?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"10.0.2+13-1ubuntu0.18.04.3"}]}],"versions":["9.0.4+12-2ubuntu4","9.0.4+12-4ubuntu1","10~46-4ubuntu1","10~46-5ubuntu1","10.0.1+10-1ubuntu2","10.0.1+10-3ubuntu1","10.0.2+13-1ubuntu0.18.04.1","10.0.2+13-1ubuntu0.18.04.2"],"ecosystem_specific":{"binaries":[{"binary_version":"10.0.2+13-1ubuntu0.18.04.3","binary_name":"openjdk-11-demo"},{"binary_version":"10.0.2+13-1ubuntu0.18.04.3","binary_name":"openjdk-11-jdk"},{"binary_version":"10.0.2+13-1ubuntu0.18.04.3","binary_name":"openjdk-11-jdk-headless"},{"binary_version":"10.0.2+13-1ubuntu0.18.04.3","binary_name":"openjdk-11-jre"},{"binary_version":"10.0.2+13-1ubuntu0.18.04.3","binary_name":"openjdk-11-jre-headless"},{"binary_version":"10.0.2+13-1ubuntu0.18.04.3","binary_name":"openjdk-11-jre-zero"},{"binary_version":"10.0.2+13-1ubuntu0.18.04.3","binary_name":"openjdk-11-source"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3804-1.json","cves_map":{"cves":[{"id":"CVE-2018-3136","severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2018-3139","severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2018-3149","severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2018-3150","severity":[{"score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2018-3169","severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2018-3180","severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2018-3183","severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:18.04:LTS"}}}],"schema_version":"1.7.3"}