drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in OpenJDK
Name: |
Mehrere Probleme in OpenJDK |
|
ID: |
USN-6810-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 23.10, Ubuntu 24.04 LTS |
|
Datum: |
Do, 6. Juni 2024, 22:31 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21094
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21085
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21011
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21068 |
|
Applikationen: |
OpenJDK |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============6765007795001099947== Content-Language: en-US Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------FDJhHi18YjuvMDGWcGTBd4TO"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --------------FDJhHi18YjuvMDGWcGTBd4TO Content-Type: multipart/mixed; boundary="------------SJDhIYHATWL4qUTNEIiSbuto"; protected-headers="v1" From: Evan Caville <evan.caville@canonical.com> Reply-To: Ubuntu Security <security@ubuntu.com> To: ubuntu-security-announce@lists.ubuntu.com Message-ID: <d94fb5e1-7c15-4b4f-a42e-c5ed6ccec76d@canonical.com> Subject: [USN-6810-1] OpenJDK 8 vulnerabilities
--------------SJDhIYHATWL4qUTNEIiSbuto Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: base64
========================================================================== Ubuntu Security Notice USN-6810-1 June 06, 2024
openjdk-8 vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.04 LTS - Ubuntu 23.10 - Ubuntu 22.04 LTS - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS
Summary:
Several security issues were fixed in OpenJDK 8.
Software Description: - openjdk-8: Open Source Java implementation
Details:
It was discovered that the Hotspot component of OpenJDK 8 incorrectly handled certain exceptions with specially crafted long messages. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-21011)
Vladimir Kondratyev discovered that the Hotspot component of OpenJDK 8 incorrectly handled address offset calculations in the C1 compiler. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2024-21068)
Yakov Shafranovich discovered that OpenJDK 8 did not properly manage memory in the Pack200 archive format. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-21085)
It was discovered that the Hotspot component of OpenJDK 8 incorrectly handled array accesses in the C2 compiler. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2024-21094)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 24.04 LTS openjdk-8-jdk 8u412-ga-1~24.04.2 openjdk-8-jdk-headless 8u412-ga-1~24.04.2 openjdk-8-jre 8u412-ga-1~24.04.2 openjdk-8-jre-headless 8u412-ga-1~24.04.2 openjdk-8-jre-zero 8u412-ga-1~24.04.2
Ubuntu 23.10 openjdk-8-jdk 8u412-ga-1~23.10.1 openjdk-8-jdk-headless 8u412-ga-1~23.10.1 openjdk-8-jre 8u412-ga-1~23.10.1 openjdk-8-jre-headless 8u412-ga-1~23.10.1 openjdk-8-jre-zero 8u412-ga-1~23.10.1
Ubuntu 22.04 LTS openjdk-8-jdk 8u412-ga-1~22.04.1 openjdk-8-jdk-headless 8u412-ga-1~22.04.1 openjdk-8-jre 8u412-ga-1~22.04.1 openjdk-8-jre-headless 8u412-ga-1~22.04.1 openjdk-8-jre-zero 8u412-ga-1~22.04.1
Ubuntu 20.04 LTS openjdk-8-jdk 8u412-ga-1~20.04.1 openjdk-8-jdk-headless 8u412-ga-1~20.04.1 openjdk-8-jre 8u412-ga-1~20.04.1 openjdk-8-jre-headless 8u412-ga-1~20.04.1 openjdk-8-jre-zero 8u412-ga-1~20.04.1
Ubuntu 18.04 LTS openjdk-8-jdk 8u412-ga-1~18.04.1 Available with Ubuntu Pro openjdk-8-jdk-headless 8u412-ga-1~18.04.1 Available with Ubuntu Pro openjdk-8-jre 8u412-ga-1~18.04.1 Available with Ubuntu Pro openjdk-8-jre-headless 8u412-ga-1~18.04.1 Available with Ubuntu Pro openjdk-8-jre-zero 8u412-ga-1~18.04.1 Available with Ubuntu Pro
This update uses a new upstream release, which includes additional bug fixes. After a standard system update you need to restart any Java applications to make all the necessary changes.
References: https://ubuntu.com/security/notices/USN-6810-1 CVE-2024-21011, CVE-2024-21068, CVE-2024-21085, CVE-2024-21094
Package Information: https://launchpad.net/ubuntu/+source/openjdk-8/8u412-ga-1~24.04.2 https://launchpad.net/ubuntu/+source/openjdk-8/8u412-ga-1~23.10.1 https://launchpad.net/ubuntu/+source/openjdk-8/8u412-ga-1~22.04.1 https://launchpad.net/ubuntu/+source/openjdk-8/8u412-ga-1~20.04.1
--------------SJDhIYHATWL4qUTNEIiSbuto--
--------------FDJhHi18YjuvMDGWcGTBd4TO Content-Type: application/pgp-signature; name="OpenPGP_signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="OpenPGP_signature.asc"
-----BEGIN PGP SIGNATURE-----
wsF5BAABCAAjFiEEAPYWTpwtIbr7xH4OWNrRIKaTkWcFAmZhNbMFAwAAAAAACgkQWNrRIKaTkWfr /Q/9EWN8Tb5zAT0eJW5DuG61zZpoJppNpGzLir2i2VZ0Lveo58Y5JJTzLLf+TR2sPvg3EvcxyMV9 xnGxWXTRP4DmQLmhkL6zFcYoMrbGANpmB1vwU2diZq5SzJTnqdjHkJdiDa0lQNV1yOwAL6FFetng brC9QtdAHvX8zo1i9zyffIIAYB7tWcPpORNnOo7pOzI7wRHvNq6maBdtmfq6xgB5HfftGeLgr7NT apGyXTcxrGffNBmm1wuWiShT1nZpQkmiLrslp1VbTwdyaapCyMQjO5pbGydYNb33A4VUYdR/A3Vu J1bq5ghp3hf7+zZY4oyDNkHm9Oz61r/C7uUOiqm2KJ9+misak0fDLua3l9RPCzP9mUV0UdWoMuSY ZZT+5sSCnpxk0oRY7682EFgRtDAIPMNMpxHPY/0z/g9+KNLXuxnIBnkKbzj6Sec5AhtO5zCYgTdP jXw29bRHpJ7HgZkaFFsICTdClrbLB5Y1Uez1/MM/4uOKrk63oRcwYVbXLO8ssofomGyzl30u+6GU 2/Df1t5xKISCxRbES9spCMoNNIwDlmJSkErTgzGSjz8YNi636IlNSopGNZ/47OL+WA+BGgPILW8n nRUGOECYiMJLZdxt+Sx8kP3W2LSVSi6n6gsFKAct2KkY39aakOKCbq0A60N8JMeQx4LW25uV5los ouQ= =su+a -----END PGP SIGNATURE-----
--------------FDJhHi18YjuvMDGWcGTBd4TO--
--===============6765007795001099947== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline
Cg==
--===============6765007795001099947==--
|
|
|
|