{"id":"USN-3366-1","summary":"openjdk-8 vulnerabilities","details":"It was discovered that the JPEGImageReader class in OpenJDK would\nincorrectly read unused image data. An attacker could use this to\nspecially construct a jpeg image file that when opened by a Java\napplication would cause a denial of service. (CVE-2017-10053)\n\nIt was discovered that the JAR verifier in OpenJDK did not properly\nhandle archives containing files missing digests. An attacker could\nuse this to modify the signed contents of a JAR file. (CVE-2017-10067)\n\nIt was discovered that integer overflows existed in the Hotspot\ncomponent of OpenJDK when generating range check loop predicates. An\nattacker could use this to specially construct an untrusted Java\napplication or applet that could escape sandbox restrictions\nand cause a denial of service or possibly execute arbitrary\ncode. (CVE-2017-10074)\n\nIt was discovered that the JavaScript Scripting component of OpenJDK\nincorrectly allowed access to Java APIs. An attacker could use this\nto specially craft JavaScript code to bypass access restrictions.\n(CVE-2017-10078)\n\nIt was discovered that OpenJDK did not properly process parentheses\nin function signatures. An attacker could use this to specially\nconstruct an untrusted Java application or applet that could escape\nsandbox restrictions. (CVE-2017-10081)\n\nIt was discovered that the ThreadPoolExecutor class in OpenJDK did not\nproperly perform access control checks when cleaning up threads. An\nattacker could use this to specially construct an untrusted Java\napplication or applet that could escape sandbox restrictions and\npossibly execute arbitrary code. (CVE-2017-10087)\n\nIt was discovered that the ServiceRegistry implementation\nin OpenJDK did not perform access control checks in certain\nsituations. An attacker could use this to specially construct\nan untrusted Java application or applet that escaped sandbox\nrestrictions. (CVE-2017-10089)\n\nIt was discovered that the channel groups implementation in\nOpenJDK did not properly perform access control checks in some\nsituations. An attacker could use this to specially construct an\nuntrusted Java application or applet that could escape sandbox\nrestrictions. (CVE-2017-10090)\n\nIt was discovered that the DTM exception handling code in the\nJAXP component of OpenJDK did not properly perform access control\nchecks. An attacker could use this to specially construct an untrusted\nJava application or applet that could escape sandbox restrictions.\n(CVE-2017-10096)\n\nIt was discovered that the JAXP component of OpenJDK incorrectly\ngranted access to some internal resolvers. An attacker could use this\nto specially construct an untrusted Java application or applet that\ncould escape sandbox restrictions. (CVE-2017-10101)\n\nIt was discovered that the Distributed Garbage Collector (DGC) in\nOpenJDK did not properly track references in some situations. A\nremote attacker could possibly use this to execute arbitrary\ncode. (CVE-2017-10102)\n\nIt was discovered that the Activation ID implementation in the RMI\ncomponent of OpenJDK did not properly check access control permissions\nin some situations. An attacker could use this to specially construct\nan untrusted Java application or applet that could escape sandbox\nrestrictions. (CVE-2017-10107)\n\nIt was discovered that the BasicAttribute class in OpenJDK did not\nproperly bound memory allocation when de-serializing objects. An\nattacker could use this to cause a denial of service (memory\nconsumption). (CVE-2017-10108)\n\nIt was discovered that the CodeSource class in OpenJDK did not\nproperly bound memory allocations when de-serializing object\ninstances. An attacker could use this to cause a denial of service\n(memory consumption). (CVE-2017-10109)\n\nIt was discovered that the AWT ImageWatched class in OpenJDK did not\nproperly perform access control checks, An attacker could use this\nto specially construct an untrusted Java application or applet that\ncould escape sandbox restrictions (CVE-2017-10110)\n\nJackson Davis discovered that the LambdaFormEditor class in the\nLibraries component of OpenJDK did not correctly perform bounds checks\nin the permuteArgumentsForm() function. An attacker could use this\nto specially construct an untrusted Java application or applet that\ncould escape sandbox restrictions and possibly execute arbitrary\ncode. (CVE-2017-10111)\n\nIt was discovered that a timing side-channel vulnerability existed\nin the DSA implementation in OpenJDK. An attacker could use this to\nexpose sensitive information. (CVE-2017-10115)\n\nIt was discovered that the LDAP implementation in OpenJDK incorrectly\nfollowed references to non-LDAP URLs. An attacker could use this to\nspecially craft an LDAP referral URL that exposes sensitive information\nor bypass access restrictions. (CVE-2017-10116)\n\nIt was discovered that a timing side-channel vulnerability existed\nin the ECDSA implementation in OpenJDK. An attacker could use this\nto expose sensitive information. (CVE-2017-10118)\n\nIlya Maykov discovered that a timing side-channel vulnerability\nexisted in the PKCS#8 implementation in OpenJDK. An attacker could\nuse this to expose sensitive information. (CVE-2017-10135)\n\nIt was discovered that the Elliptic Curve (EC) implementation\nin OpenJDK did not properly compute certain elliptic curve\npoints. An attacker could use this to expose sensitive\ninformation. (CVE-2017-10176)\n\nIt was discovered that OpenJDK did not properly restrict weak key\nsizes in some situations. An attacker could use this to specially\nconstruct an untrusted Java application or applet that could escape\nsandbox restrictions. (CVE-2017-10193)\n\nIt was discovered that OpenJDK did not properly enforce disabled\nalgorithm restrictions on X.509 certificate chains. An attacker\ncould use this to expose sensitive information or escape sandbox\nrestrictions. (CVE-2017-10198)\n\nIt was discovered that OpenJDK did not properly perform access control\nchecks when handling Web Service Definition Language (WSDL) XML\ndocuments. An attacker could use this to expose sensitive information.\n(CVE-2017-10243)\n\n","modified":"2026-02-10T04:41:11Z","published":"2017-07-26T20:42:50Z","related":["UBUNTU-CVE-2017-10053","UBUNTU-CVE-2017-10067","UBUNTU-CVE-2017-10074","UBUNTU-CVE-2017-10078","UBUNTU-CVE-2017-10081","UBUNTU-CVE-2017-10087","UBUNTU-CVE-2017-10089","UBUNTU-CVE-2017-10090","UBUNTU-CVE-2017-10096","UBUNTU-CVE-2017-10101","UBUNTU-CVE-2017-10102","UBUNTU-CVE-2017-10107","UBUNTU-CVE-2017-10108","UBUNTU-CVE-2017-10109","UBUNTU-CVE-2017-10110","UBUNTU-CVE-2017-10111","UBUNTU-CVE-2017-10115","UBUNTU-CVE-2017-10116","UBUNTU-CVE-2017-10118","UBUNTU-CVE-2017-10135","UBUNTU-CVE-2017-10176","UBUNTU-CVE-2017-10193","UBUNTU-CVE-2017-10198","UBUNTU-CVE-2017-10243"],"upstream":["CVE-2017-10053","CVE-2017-10067","CVE-2017-10074","CVE-2017-10078","CVE-2017-10081","CVE-2017-10087","CVE-2017-10089","CVE-2017-10090","CVE-2017-10096","CVE-2017-10101","CVE-2017-10102","CVE-2017-10107","CVE-2017-10108","CVE-2017-10109","CVE-2017-10110","CVE-2017-10111","CVE-2017-10115","CVE-2017-10116","CVE-2017-10118","CVE-2017-10135","CVE-2017-10176","CVE-2017-10193","CVE-2017-10198","CVE-2017-10243","UBUNTU-CVE-2017-10053","UBUNTU-CVE-2017-10067","UBUNTU-CVE-2017-10074","UBUNTU-CVE-2017-10078","UBUNTU-CVE-2017-10081","UBUNTU-CVE-2017-10087","UBUNTU-CVE-2017-10089","UBUNTU-CVE-2017-10090","UBUNTU-CVE-2017-10096","UBUNTU-CVE-2017-10101","UBUNTU-CVE-2017-10102","UBUNTU-CVE-2017-10107","UBUNTU-CVE-2017-10108","UBUNTU-CVE-2017-10109","UBUNTU-CVE-2017-10110","UBUNTU-CVE-2017-10111","UBUNTU-CVE-2017-10115","UBUNTU-CVE-2017-10116","UBUNTU-CVE-2017-10118","UBUNTU-CVE-2017-10135","UBUNTU-CVE-2017-10176","UBUNTU-CVE-2017-10193","UBUNTU-CVE-2017-10198","UBUNTU-CVE-2017-10243"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3366-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-10053"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-10067"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-10074"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-10078"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-10081"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-10087"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-10089"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-10090"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-10096"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-10101"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-10102"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-10107"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-10108"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-10109"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-10110"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-10111"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-10115"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-10116"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-10118"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-10135"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-10176"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-10193"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-10198"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-10243"}],"affected":[{"package":{"name":"openjdk-8","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/openjdk-8@8u131-b11-2ubuntu1.16.04.2?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8u131-b11-2ubuntu1.16.04.2"}]}],"versions":["8u66-b01-5","8u72-b05-1ubuntu1","8u72-b05-5","8u72-b05-6","8u72-b15-1","8u72-b15-2ubuntu1","8u72-b15-2ubuntu3","8u72-b15-3ubuntu1","8u77-b03-1ubuntu2","8u77-b03-3ubuntu1","8u77-b03-3ubuntu2","8u77-b03-3ubuntu3","8u91-b14-0ubuntu4~16.04.1","8u91-b14-3ubuntu1~16.04.1","8u111-b14-2ubuntu0.16.04.2","8u121-b13-0ubuntu1.16.04.2","8u131-b11-0ubuntu1.16.04.2"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"8u131-b11-2ubuntu1.16.04.2","binary_name":"openjdk-8-demo"},{"binary_version":"8u131-b11-2ubuntu1.16.04.2","binary_name":"openjdk-8-jdk"},{"binary_version":"8u131-b11-2ubuntu1.16.04.2","binary_name":"openjdk-8-jdk-headless"},{"binary_version":"8u131-b11-2ubuntu1.16.04.2","binary_name":"openjdk-8-jre"},{"binary_version":"8u131-b11-2ubuntu1.16.04.2","binary_name":"openjdk-8-jre-headless"},{"binary_version":"8u131-b11-2ubuntu1.16.04.2","binary_name":"openjdk-8-jre-jamvm"},{"binary_version":"8u131-b11-2ubuntu1.16.04.2","binary_name":"openjdk-8-jre-zero"},{"binary_version":"8u131-b11-2ubuntu1.16.04.2","binary_name":"openjdk-8-source"}]},"database_specific":{"cves_map":{"cves":[{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2017-10053"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-10067"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-10074"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-10078"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2017-10081"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-10087"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-10089"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-10090"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-10096"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-10101"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-10102"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-10107"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2017-10108"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2017-10109"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-10110"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-10111"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-10115"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-10116"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-10118"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-10135"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-10176"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-10193"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-10198"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2017-10243"}],"ecosystem":"Ubuntu:16.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3366-1.json"}}],"schema_version":"1.7.3"}