Login
Newsletter
Werbung

Sicherheit: Preisgabe von Informationen in OpenJDK
Aktuelle Meldungen Distributionen
Name: Preisgabe von Informationen in OpenJDK
ID: USN-3875-1
Distribution: Ubuntu
Plattformen: Ubuntu 16.04 LTS, Ubuntu 18.10
Datum: Do, 31. Januar 2019, 07:23
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2422
Applikationen: OpenJDK

Originalnachricht


--===============1993380610492466741==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="DSayHWYpDlRfCAAQ"
Content-Disposition: inline


--DSayHWYpDlRfCAAQ
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline

==========================================================================
Ubuntu Security Notice USN-3875-1
January 30, 2019

openjdk-8, openjdk-lts vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.10
- Ubuntu 16.04 LTS

Summary:

Java applets or applications could be made to expose sensitive
information.

Software Description:
- openjdk-lts: Open Source Java implementation
- openjdk-8: Open Source Java implementation

Details:

It was discovered that a memory disclosure issue existed in the OpenJDK
Library subsystem. An attacker could use this to expose sensitive
information and possibly bypass Java sandbox restrictions. (CVE-2019-2422)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.10:
openjdk-11-jdk 11.0.1+13-3ubuntu3.18.10.1
openjdk-11-jre 11.0.1+13-3ubuntu3.18.10.1
openjdk-11-jre-headless 11.0.1+13-3ubuntu3.18.10.1

Ubuntu 16.04 LTS:
openjdk-8-jdk 8u191-b12-2ubuntu0.16.04.1
openjdk-8-jre 8u191-b12-2ubuntu0.16.04.1
openjdk-8-jre-headless 8u191-b12-2ubuntu0.16.04.1
openjdk-8-jre-jamvm 8u191-b12-2ubuntu0.16.04.1

This update uses a new upstream release, which includes additional bug
fixes. After a standard system update you need to restart any Java
applications or applets to make all the necessary changes.

References:
https://usn.ubuntu.com/usn/usn-3875-1
CVE-2019-2422

Package Information:
https://launchpad.net/ubuntu/+source/openjdk-lts/11.0.1+13-3ubuntu3.18.10.1
https://launchpad.net/ubuntu/+source/openjdk-8/8u191-b12-2ubuntu0.16.04.1


--DSayHWYpDlRfCAAQ
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----
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=0r0J
-----END PGP SIGNATURE-----

--DSayHWYpDlRfCAAQ--


--===============1993380610492466741==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
Pro-Linux
Pro-Linux @Twitter
Neue Nachrichten
Werbung