ESB-2018.2311 - [Debian] openjdk-8: Denial of service - Remote/unauthenticated 2018-08-13

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2018.2311
                         openjdk-8 security update
                              13 August 2018

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           openjdk-8
Publisher:         Debian
Operating System:  Debian GNU/Linux 9
Impact/Access:     Denial of Service -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2018-2952  

Reference:         ASB-2018.0169
                   ESB-2018.2309
                   ESB-2018.2145
                   ESB-2018.2144
                   ESB-2018.2131

Original Bulletin: 
   http://www.debian.org/security/2018/dsa-4268

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-4268-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
August 10, 2018                       https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : openjdk-8
CVE ID         : CVE-2018-2952

It was discovered that the PatternSyntaxException class in the
Concurrency component of OpenJDK, an implementation of the Oracle Java
platform could result in denial of service via excessive memory
consumption.
		      
For the stable distribution (stretch), this problem has been fixed in
version 8u181-b13-1~deb9u1.

We recommend that you upgrade your openjdk-8 packages.

For the detailed security status of openjdk-8 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/openjdk-8

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
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=nN0M
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=/3m0
-----END PGP SIGNATURE-----

« Back to bulletins