Login


 
Newsletter
Werbung
Sicherheit: Mehrere Probleme in OpenJDK
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in OpenJDK
ID: USN-1819-1
Distribution: Ubuntu
Plattformen: Ubuntu 10.04 LTS, Ubuntu 11.10, Ubuntu 12.04 LTS
Datum: Di, 7. Mai 2013, 22:45
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0401
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1488
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1518
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1537
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1557
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1558
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1569
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2383
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2384
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2415
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2417
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2419
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2420
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2421
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2422
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2424
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2426
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2429
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2430
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2431
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2436
https://launchpad.net/ubuntu/+source/openjdk-6/6b27-1.12.5-0ubuntu0.10.04.1
https://launchpad.net/ubuntu/+source/openjdk-6/6b27-1.12.5-0ubuntu0.11.10.1
https://launchpad.net/ubuntu/+source/openjdk-6/6b27-1.12.5-0ubuntu0.12.04.1

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--===============8196056260801548118==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="------------enigD05F0A9770BC8BA8E06513CF"

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enigD05F0A9770BC8BA8E06513CF
Content-Type: text/plain; charset=ISO-8859-
Content-Transfer-Encoding: quoted-printable


==========================================================================
Ubuntu Security Notice USN-1819-1
May 07, 2013

openjdk-6 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 12.04 LTS
- Ubuntu 11.10
- Ubuntu 10.04 LTS

Summary:

Several security issues were fixed in OpenJDK 6.

Software Description:
- openjdk-6: Open Source Java implementation

Details:

Ben Murphy discovered a vulnerability in the OpenJDK JRE related to
information disclosure and data integrity. An attacker could exploit this
to execute arbitrary code. (CVE-2013-0401)

James Forshaw discovered a vulnerability in the OpenJDK JRE related to
information disclosure, data integrity and availability. An attacker could
exploit this to execute arbitrary code. (CVE-2013-1488)

Several vulnerabilities were discovered in the OpenJDK JRE related to
information disclosure, data integrity and availability. An attacker could
exploit these to cause a denial of service or expose sensitive data over
the network. (CVE-2013-1518, CVE-2013-1537, CVE-2013-1557, CVE-2013-1558,
CVE-2013-1569, CVE-2013-2383, CVE-2013-2384, CVE-2013-2420, CVE-2013-2421,
CVE-2013-2422, CVE-2013-2426, CVE-2013-2429, CVE-2013-2430, CVE-2013-2431,
CVE-2013-2436)

Two vulnerabilities were discovered in the OpenJDK JRE related to
confidentiality. An attacker could exploit these to expose sensitive data
over the network. (CVE-2013-2415, CVE-2013-2424)

Two vulnerabilities were discovered in the OpenJDK JRE related to
availability. An attacker could exploit these to cause a denial of service.
(CVE-2013-2417, CVE-2013-2419)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.04 LTS:
icedtea-6-jre-cacao 6b27-1.12.5-0ubuntu0.12.04.1
icedtea-6-jre-jamvm 6b27-1.12.5-0ubuntu0.12.04.1
openjdk-6-jre 6b27-1.12.5-0ubuntu0.12.04.1
openjdk-6-jre-headless 6b27-1.12.5-0ubuntu0.12.04.1
openjdk-6-jre-lib 6b27-1.12.5-0ubuntu0.12.04.1
openjdk-6-jre-zero 6b27-1.12.5-0ubuntu0.12.04.1

Ubuntu 11.10:
icedtea-6-jre-cacao 6b27-1.12.5-0ubuntu0.11.10.1
icedtea-6-jre-jamvm 6b27-1.12.5-0ubuntu0.11.10.1
openjdk-6-jre 6b27-1.12.5-0ubuntu0.11.10.1
openjdk-6-jre-headless 6b27-1.12.5-0ubuntu0.11.10.1
openjdk-6-jre-lib 6b27-1.12.5-0ubuntu0.11.10.1
openjdk-6-jre-zero 6b27-1.12.5-0ubuntu0.11.10.1

Ubuntu 10.04 LTS:
icedtea-6-jre-cacao 6b27-1.12.5-0ubuntu0.10.04.1
openjdk-6-jre 6b27-1.12.5-0ubuntu0.10.04.1
openjdk-6-jre-headless 6b27-1.12.5-0ubuntu0.10.04.1
openjdk-6-jre-lib 6b27-1.12.5-0ubuntu0.10.04.1
openjdk-6-jre-zero 6b27-1.12.5-0ubuntu0.10.04.1

This update uses a new upstream release, which includes additional bug
fixes. After a standard system update you need to restart any Java
applications or applets to make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-1819-1
CVE-2013-0401, CVE-2013-1488, CVE-2013-1518, CVE-2013-1537,
CVE-2013-1557, CVE-2013-1558, CVE-2013-1569, CVE-2013-2383,
CVE-2013-2384, CVE-2013-2415, CVE-2013-2417, CVE-2013-2419,
CVE-2013-2420, CVE-2013-2421, CVE-2013-2422, CVE-2013-2424,
CVE-2013-2426, CVE-2013-2429, CVE-2013-2430, CVE-2013-2431

Package Information:

https://launchpad.net/ubuntu/+source/openjdk-6/6b27-1.12.5-0ubuntu0.12.04.1

https://launchpad.net/ubuntu/+source/openjdk-6/6b27-1.12.5-0ubuntu0.11.10.1

https://launchpad.net/ubuntu/+source/openjdk-6/6b27-1.12.5-0ubuntu0.10.04.1





--------------enigD05F0A9770BC8BA8E06513CF
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with undefined - http://www.enigmail.net/
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=k+z4
-----END PGP SIGNATURE-----

--------------enigD05F0A9770BC8BA8E06513CF--


--===============8196056260801548118==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

--===============8196056260801548118==--
Pro-Linux
Forum
Neue Nachrichten
Werbung