Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in OpenJDK
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in OpenJDK
ID: USN-6810-1
Distribution: Ubuntu
Plattformen: Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 23.10, Ubuntu 24.04 LTS
Datum: Do, 6. Juni 2024, 22:31
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21094
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21085
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21011
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21068
Applikationen: OpenJDK

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============6765007795001099947==
Content-Language: en-US
Content-Type: multipart/signed; micalg=pgp-sha256;
protocol="application/pgp-signature";
boundary="------------FDJhHi18YjuvMDGWcGTBd4TO"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------FDJhHi18YjuvMDGWcGTBd4TO
Content-Type: multipart/mixed;
boundary="------------SJDhIYHATWL4qUTNEIiSbuto";
protected-headers="v1"
From: Evan Caville <evan.caville@canonical.com>
Reply-To: Ubuntu Security <security@ubuntu.com>
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID: <d94fb5e1-7c15-4b4f-a42e-c5ed6ccec76d@canonical.com>
Subject: [USN-6810-1] OpenJDK 8 vulnerabilities

--------------SJDhIYHATWL4qUTNEIiSbuto
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64

==========================================================================
Ubuntu Security Notice USN-6810-1
June 06, 2024

openjdk-8 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.04 LTS
- Ubuntu 23.10
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS

Summary:

Several security issues were fixed in OpenJDK 8.

Software Description:
- openjdk-8: Open Source Java implementation

Details:

It was discovered that the Hotspot component of OpenJDK 8 incorrectly
handled certain exceptions with specially crafted long messages. An
attacker could possibly use this issue to cause a denial of service.
(CVE-2024-21011)

Vladimir Kondratyev discovered that the Hotspot component of OpenJDK 8
incorrectly handled address offset calculations in the C1 compiler. An
attacker could possibly use this issue to cause a denial of service
or execute arbitrary code. (CVE-2024-21068)

Yakov Shafranovich discovered that OpenJDK 8 did not properly manage
memory in the Pack200 archive format. An attacker could possibly use this
issue to cause a denial of service. (CVE-2024-21085)

It was discovered that the Hotspot component of OpenJDK 8 incorrectly
handled array accesses in the C2 compiler. An attacker could possibly use
this issue to cause a denial of service or execute arbitrary code.
(CVE-2024-21094)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.04 LTS
openjdk-8-jdk 8u412-ga-1~24.04.2
openjdk-8-jdk-headless 8u412-ga-1~24.04.2
openjdk-8-jre 8u412-ga-1~24.04.2
openjdk-8-jre-headless 8u412-ga-1~24.04.2
openjdk-8-jre-zero 8u412-ga-1~24.04.2

Ubuntu 23.10
openjdk-8-jdk 8u412-ga-1~23.10.1
openjdk-8-jdk-headless 8u412-ga-1~23.10.1
openjdk-8-jre 8u412-ga-1~23.10.1
openjdk-8-jre-headless 8u412-ga-1~23.10.1
openjdk-8-jre-zero 8u412-ga-1~23.10.1

Ubuntu 22.04 LTS
openjdk-8-jdk 8u412-ga-1~22.04.1
openjdk-8-jdk-headless 8u412-ga-1~22.04.1
openjdk-8-jre 8u412-ga-1~22.04.1
openjdk-8-jre-headless 8u412-ga-1~22.04.1
openjdk-8-jre-zero 8u412-ga-1~22.04.1

Ubuntu 20.04 LTS
openjdk-8-jdk 8u412-ga-1~20.04.1
openjdk-8-jdk-headless 8u412-ga-1~20.04.1
openjdk-8-jre 8u412-ga-1~20.04.1
openjdk-8-jre-headless 8u412-ga-1~20.04.1
openjdk-8-jre-zero 8u412-ga-1~20.04.1

Ubuntu 18.04 LTS
openjdk-8-jdk 8u412-ga-1~18.04.1
Available with Ubuntu Pro
openjdk-8-jdk-headless 8u412-ga-1~18.04.1
Available with Ubuntu Pro
openjdk-8-jre 8u412-ga-1~18.04.1
Available with Ubuntu Pro
openjdk-8-jre-headless 8u412-ga-1~18.04.1
Available with Ubuntu Pro
openjdk-8-jre-zero 8u412-ga-1~18.04.1
Available with Ubuntu Pro

This update uses a new upstream release, which includes additional bug
fixes. After a standard system update you need to restart any Java
applications to make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-6810-1
CVE-2024-21011, CVE-2024-21068, CVE-2024-21085, CVE-2024-21094

Package Information:
https://launchpad.net/ubuntu/+source/openjdk-8/8u412-ga-1~24.04.2
https://launchpad.net/ubuntu/+source/openjdk-8/8u412-ga-1~23.10.1
https://launchpad.net/ubuntu/+source/openjdk-8/8u412-ga-1~22.04.1
https://launchpad.net/ubuntu/+source/openjdk-8/8u412-ga-1~20.04.1

--------------SJDhIYHATWL4qUTNEIiSbuto--

--------------FDJhHi18YjuvMDGWcGTBd4TO
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature.asc"

-----BEGIN PGP SIGNATURE-----
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=su+a
-----END PGP SIGNATURE-----

--------------FDJhHi18YjuvMDGWcGTBd4TO--


--===============6765007795001099947==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

Cg==

--===============6765007795001099947==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung