drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Ausführen beliebiger Kommandos in OpenJDK
Name: |
Ausführen beliebiger Kommandos in OpenJDK |
|
ID: |
USN-2818-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 14.04 LTS, Ubuntu 15.04, Ubuntu 15.10 |
|
Datum: |
Mi, 25. November 2015, 22:07 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4871 |
|
Applikationen: |
OpenJDK |
|
Originalnachricht |
--===============2095954160522877125== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="d6Gm4EdcadzBjdND" Content-Disposition: inline
--d6Gm4EdcadzBjdND Content-Type: text/plain; charset=us-ascii Content-Disposition: inline
========================================================================== Ubuntu Security Notice USN-2818-1 November 25, 2015
openjdk-7 vulnerability ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 15.10 - Ubuntu 15.04 - Ubuntu 14.04 LTS
Summary:
A security issue was fixed in OpenJDK 7.
Software Description: - openjdk-7: Open Source Java implementation
Details:
It was discovered that rebinding of the receiver of a DirectMethodHandle may allow a protected method to be accessed. Am attacker could use this to expose sensitive information or possibly execute arbitrary code.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 15.10: icedtea-7-jre-jamvm 7u91-2.6.3-0ubuntu0.15.10.1 openjdk-7-jre 7u91-2.6.3-0ubuntu0.15.10.1 openjdk-7-jre-headless 7u91-2.6.3-0ubuntu0.15.10.1 openjdk-7-jre-lib 7u91-2.6.3-0ubuntu0.15.10.1 openjdk-7-jre-zero 7u91-2.6.3-0ubuntu0.15.10.1
Ubuntu 15.04: icedtea-7-jre-jamvm 7u91-2.6.3-0ubuntu0.15.04.1 openjdk-7-jre 7u91-2.6.3-0ubuntu0.15.04.1 openjdk-7-jre-headless 7u91-2.6.3-0ubuntu0.15.04.1 openjdk-7-jre-lib 7u91-2.6.3-0ubuntu0.15.04.1 openjdk-7-jre-zero 7u91-2.6.3-0ubuntu0.15.04.1
Ubuntu 14.04 LTS: icedtea-7-jre-jamvm 7u91-2.6.3-0ubuntu0.14.04.1 openjdk-7-jre 7u91-2.6.3-0ubuntu0.14.04.1 openjdk-7-jre-headless 7u91-2.6.3-0ubuntu0.14.04.1 openjdk-7-jre-lib 7u91-2.6.3-0ubuntu0.14.04.1 openjdk-7-jre-zero 7u91-2.6.3-0ubuntu0.14.04.1
After a standard system update you need to restart any Java applications or applets to make all the necessary changes.
References: http://www.ubuntu.com/usn/usn-2818-1 CVE-2015-4871
Package Information: https://launchpad.net/ubuntu/+source/openjdk-7/7u91-2.6.3-0ubuntu0.15.10.1 https://launchpad.net/ubuntu/+source/openjdk-7/7u91-2.6.3-0ubuntu0.15.04.1 https://launchpad.net/ubuntu/+source/openjdk-7/7u91-2.6.3-0ubuntu0.14.04.1
--d6Gm4EdcadzBjdND Content-Type: application/pgp-signature; name="signature.asc" Content-Description: Digital signature
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIcBAEBCgAGBQJWVe5QAAoJEC8Jno0AXoH0f2YP/2R+U85iFh/03E+FAdhrZTfO mVcWeucwkuj/fmUk71TGiSWvdNRuCZv/rhQndhgWkze547XxfyLGseLlbjn0aVtz gKKuzXOQdJolrc3fd+I4Fri1c2LfGAuzzExqDRlygIIZod8eOZL4fqPHrhg0ivXj 2m9WbZhMerbbWDYWAzFwfh5AgKzFEx2FCYtLi+gXtpGqTD1rhdr9fcVenjvZp60T 2U89ZmiNJeQQq88FipfMFZLzc5Q48ugSVBYiOZN1p3Ms0cZ2L1nGxZqO2LHg1CYc fVVJUjdfz1Ru2vCt+XoW5VR2uLqHW5uKE/+6V5ulHhclNmqip67olfPtdm8+ldxN vZtf6WuTiQfGMoZ3cvEByHS321eM+pj3cujQfP+eCBNn7MF6MYYBIPKmePVR/VDc BczM/sq6138vA1rVgenu4XhsvIG2szH/w+BN617GQEWB92YxJA8vbRFMeT1QTBvH n3+3oob+Vp1aMbhHgfwxyHe+RTcO2T/HCZnsndrUWLqH5qGv1WmirxgbqZe8u2il 7PHVhaTOcdA3wEx/HYo61TpOc5Sf/Aku+hPASxAi9yStjIPMg9msUizibSL9y598 DCB50388LPxPJsDFldp3Rit3WcPi/WGZDxFGavVRkrWzA/k0uA9RMug9lmV/+2VX yrjY1qlXZBJ4C95cDXjx =mhoS -----END PGP SIGNATURE-----
--d6Gm4EdcadzBjdND--
--===============2095954160522877125== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
--===============2095954160522877125==--
|
|
|
|