drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Preisgabe von Informationen in OpenJDK
Name: |
Preisgabe von Informationen in OpenJDK |
|
ID: |
USN-3875-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 16.04 LTS, Ubuntu 18.10 |
|
Datum: |
Do, 31. Januar 2019, 07:23 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2422 |
|
Applikationen: |
OpenJDK |
|
Originalnachricht |
--===============1993380610492466741== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="DSayHWYpDlRfCAAQ" Content-Disposition: inline
--DSayHWYpDlRfCAAQ Content-Type: text/plain; charset=us-ascii Content-Disposition: inline
========================================================================== Ubuntu Security Notice USN-3875-1 January 30, 2019
openjdk-8, openjdk-lts vulnerability ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 18.10 - Ubuntu 16.04 LTS
Summary:
Java applets or applications could be made to expose sensitive information.
Software Description: - openjdk-lts: Open Source Java implementation - openjdk-8: Open Source Java implementation
Details:
It was discovered that a memory disclosure issue existed in the OpenJDK Library subsystem. An attacker could use this to expose sensitive information and possibly bypass Java sandbox restrictions. (CVE-2019-2422)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 18.10: openjdk-11-jdk 11.0.1+13-3ubuntu3.18.10.1 openjdk-11-jre 11.0.1+13-3ubuntu3.18.10.1 openjdk-11-jre-headless 11.0.1+13-3ubuntu3.18.10.1
Ubuntu 16.04 LTS: openjdk-8-jdk 8u191-b12-2ubuntu0.16.04.1 openjdk-8-jre 8u191-b12-2ubuntu0.16.04.1 openjdk-8-jre-headless 8u191-b12-2ubuntu0.16.04.1 openjdk-8-jre-jamvm 8u191-b12-2ubuntu0.16.04.1
This update uses a new upstream release, which includes additional bug fixes. After a standard system update you need to restart any Java applications or applets to make all the necessary changes.
References: https://usn.ubuntu.com/usn/usn-3875-1 CVE-2019-2422
Package Information: https://launchpad.net/ubuntu/+source/openjdk-lts/11.0.1+13-3ubuntu3.18.10.1 https://launchpad.net/ubuntu/+source/openjdk-8/8u191-b12-2ubuntu0.16.04.1
--DSayHWYpDlRfCAAQ Content-Type: application/pgp-signature; name="signature.asc"
-----BEGIN PGP SIGNATURE-----
iQIzBAABCgAdFiEEpgY7tWAjCaQ8jrvULwmejQBegfQFAlxSOZUACgkQLwmejQBe gfSCQBAAgmLFLqM7sfc4P3E9xcTIDBnn8oWsu/0hVzTCEIObPAClMMR/JXxgcIER JuPYDcQxafZMkQBO4KQwgSgtJRAMonTXzOwdok1Vh4+ekR+ipGacN33j5q9e1NW3 TXQSiY/2TnOjRXMuvN/KGgyXZNbtw/bWfXdN8HUdaMfWxO8I0r06ebnnd4rxKu3R 9/3V1RUtKue9s0WZ9PONMh+x3BXUd6RmN0bTpM3TyCEgb+bQ1HpUyTwJZ3CZmfT+ 7lqeF/dSE/8C8nu6Vf3EDdCta58ZxORMFCFfqe5FCrAhkT6ylk3OhncLha4KHWV7 7+mmItURAwRC1Jf7kd8V2ymftS8i5BMQUK8aJ54EmylZp9MajMXVqGYr+vky7/g9 GeMMARg7fVnDBhBpQz3gfiVFKGQF/1/MdQ3Q/i1X5h23wt8SAPn1kZNeKRyWqO1O +gtK+Ua1x8h4sqiSZxOXR8b3ot6SiFbHksfNWFtAIyVuNbORFvd7FIYDAJBaaV6q jgxtJFZ9sthnn1Kf8tBJt4E3ojmtT2RjsAgyVpgL+JruZ74FnAaGOF/z4/EWTFLI 8WZ+syPGVNAwmsLX7PhQF12EJNHHC6e34BwFVsSziHG415fbhInx9Xt1e8t8s0KK sjhwRXbS2BzfvRlCkRBR7A530+lM++aw9aef0Hb0GUsr5I35tkg= =0r0J -----END PGP SIGNATURE-----
--DSayHWYpDlRfCAAQ--
--===============1993380610492466741== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
|
|
|
|