Errata overview
Errata ID 62
Date 2018-05-16
Source package openjdk-8
Fixed in version 8u171-b11-1~deb9u1
Description
This update addresses the following issues:
* CVE-2016-9841: Upgrade compression library. There were four off by one
  errors found in the zlib library. Two of them are long typed which could
  lead to RCE.
* CVE-2016-10165: Improve CMS header processing. Missing bounds check could
  lead to leaked memory contents.
* CVE-2017-10274: Handle smartcard clean up better. If a CardImpl can be
  recovered via finalization, then separate instances pointing to the same
  device can be created.
* CVE-2017-10281: Better queuing priorities. PriorityQueue's readObject
  allocates an array based on data in the stream which could cause an OOM.
* CVE-2017-10285: Unreferenced references. RMI's Unreferenced thread can be
  used as the root of a Trusted Method Chain.
* CVE-2017-10295: Better URL connections. On Ubuntu (and possibly other Linux
  flavors) CR-NL in the host field are ignored and can be used to inject
  headers in an HTTP request stream.
* CVE-2017-10345: Better keystore handling. A malicious serialized object in
  a keystore can cause a DoS when using keytool.
* CVE-2017-10346: Better alignment of special invocations. A missing load
  constraint for some invokespecial cases can allow invoking a method from an
  unrelated class.
* CVE-2017-10347: Better timezone processing. An array is allocated based on
  data in the serial stream without a limit on the size.
* CVE-2017-10348: Better processing of unresolved permissions. An array is
  allocated based on data in the serial stream without a limit on the size.
* CVE-2017-10349: Better Node predications. An array is allocated based on
  data in the serial stream without a limit on the size.
* CVE-2017-10350: Better Base Exceptions. An array is allocated based on data
  in the serial stream without a limit on the size.
* CVE-2017-10355: More stable connection processing. If an attack can cause
  an application to open a connection to a malicious FTP server (e.g., via
  XML), then a thread can be tied up indefinitely in accept(2).
* CVE-2017-10356: Update storage implementations. JKS and JCEKS keystores
  should be retired from common use in favor of more modern keystore
  protections.
* CVE-2017-10357: Process Proxy presentation. A malicious serialized stream
  could cause an OOM due to lack on checking on the number of interfaces read
  from the stream for a Proxy.
* CVE-2017-10388: Correct Kerberos ticket grants. Kerberos implementations
  can incorrectly take information from the unencrypted portion of the ticket
  from the KDC. This can lead to an MITM attack impersonating Kerberos
  services.
* CVE-2018-2579: unsynchronized access to encryption key data
* CVE-2018-2582: insufficient validation of the invokeinterface instruction
* CVE-2018-2588: LdapLoginModule insufficient username encoding in LDAP query
* CVE-2018-2599: DnsClient missing source port randomization
* CVE-2018-2602: loading of classes from untrusted locations
* CVE-2018-2603: DerValue unbounded memory allocation
* CVE-2018-2618: insufficient strength of key agreement
* CVE-2018-2629: GSS context use-after-free
* CVE-2018-2633: LDAPCertStore insecure handling of LDAP referrals
* CVE-2018-2634: use of global credentials for HTTP/SPNEGO
* CVE-2018-2637: SingleEntryRegistry incorrect setup of deserialization
  filter
* CVE-2018-2641: GTK library loading use-after-free
* CVE-2018-2663: ArrayBlockingQueue deserialization to an inconsistent state
* CVE-2018-2677: unbounded memory allocation during deserialization
* CVE-2018-2678: unbounded memory allocation in BasicAttributes
  deserialization
* CVE-2018-2790: incorrect merging of sections in the JAR manifest
* CVE-2018-2794: unrestricted deserialization of data from JCEKS key stores
* CVE-2018-2795: insufficient consistency checks in deserialization of
  multiple classes
* CVE-2018-2796: unbounded memory allocation during deserialization in
  PriorityBlockingQueue
* CVE-2018-2797: unbounded memory allocation during deserialization in
  TabularDataSupport
* CVE-2018-2798: unbounded memory allocation during deserialization in
  Container
* CVE-2018-2799: unbounded memory allocation during deserialization in
  NamedNodeMapImpl
* CVE-2018-2800: RMI HTTP transport enabled by default
* CVE-2018-2814: incorrect handling of Reference clones can lead to sandbox
  bypass
* CVE-2018-2815: unbounded memory allocation during deserialization in
  StubIORImpl
Additional notes
CVE ID CVE-2016-9841
CVE-2016-10165
CVE-2017-10274
CVE-2017-10281
CVE-2017-10285
CVE-2017-10295
CVE-2017-10345
CVE-2017-10346
CVE-2017-10347
CVE-2017-10348
CVE-2017-10349
CVE-2017-10350
CVE-2017-10355
CVE-2017-10356
CVE-2017-10357
CVE-2017-10388
CVE-2018-2579
CVE-2018-2582
CVE-2018-2588
CVE-2018-2599
CVE-2018-2602
CVE-2018-2603
CVE-2018-2618
CVE-2018-2629
CVE-2018-2633
CVE-2018-2634
CVE-2018-2637
CVE-2018-2641
CVE-2018-2663
CVE-2018-2677
CVE-2018-2678
CVE-2018-2790
CVE-2018-2794
CVE-2018-2795
CVE-2018-2796
CVE-2018-2797
CVE-2018-2798
CVE-2018-2799
CVE-2018-2800
CVE-2018-2814
CVE-2018-2815
UCS Bug number #46695