[Trisquel-security] [USN-2124-2] OpenJDK 6 regression
Jamie Strandboge
jamie at canonical.com
Tue Apr 8 04:38:38 CEST 2014
==========================================================================
Ubuntu Security Notice USN-2124-2
April 08, 2014
openjdk-6 regression
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.04 LTS
- Ubuntu 10.04 LTS
Summary:
USN-2124-1 introduced a regression in OpenJDK 6.
Software Description:
- openjdk-6: Open Source Java implementation
Details:
USN-2124-1 fixed vulnerabilities in OpenJDK 6. Due to an upstream
regression, memory was not properly zeroed under certain circumstances
which could lead to instability. This update fixes the problem.
We apologize for the inconvenience.
Original advisory details:
A vulnerability was discovered in the OpenJDK JRE related to information
disclosure and data integrity. An attacker could exploit this to expose
sensitive data over the network. (CVE-2014-0411)
Several vulnerabilities were discovered in the OpenJDK JRE related to
information disclosure, data integrity and availability. An attacker could
exploit these to cause a denial of service or expose sensitive data over
the network. (CVE-2013-5878, CVE-2013-5907, CVE-2014-0373, CVE-2014-0422,
CVE-2014-0428)
Two vulnerabilities were discovered in the OpenJDK JRE related to
information disclosure. An attacker could exploit these to expose sensitive
data over the network. (CVE-2013-5884, CVE-2014-0368)
Two vulnerabilities were discovered in the OpenJDK JRE related to
availability. An attacker could exploit these to cause a denial of service.
(CVE-2013-5896, CVE-2013-5910)
Two vulnerabilities were discovered in the OpenJDK JRE related to data
integrity. (CVE-2014-0376, CVE-2014-0416)
A vulnerability was discovered in the OpenJDK JRE related to information
disclosure and availability. An attacker could exploit this to expose
sensitive data over the network or cause a denial of service.
(CVE-2014-0423)
In addition to the above, USN-2033-1 fixed several vulnerabilities and bugs
in OpenJDK 6. This update introduced a regression which caused an exception
condition in javax.xml when instantiating encryption algorithms. This
update fixes the problem. We apologize for the inconvenience.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.04 LTS:
icedtea-6-jre-cacao 6b30-1.13.1-1ubuntu2~0.12.04.3
icedtea-6-jre-jamvm 6b30-1.13.1-1ubuntu2~0.12.04.3
openjdk-6-jre 6b30-1.13.1-1ubuntu2~0.12.04.3
openjdk-6-jre-headless 6b30-1.13.1-1ubuntu2~0.12.04.3
openjdk-6-jre-lib 6b30-1.13.1-1ubuntu2~0.12.04.3
openjdk-6-jre-zero 6b30-1.13.1-1ubuntu2~0.12.04.3
Ubuntu 10.04 LTS:
icedtea-6-jre-cacao 6b30-1.13.1-1ubuntu2~0.10.04.2
openjdk-6-jre 6b30-1.13.1-1ubuntu2~0.10.04.2
openjdk-6-jre-headless 6b30-1.13.1-1ubuntu2~0.10.04.2
openjdk-6-jre-lib 6b30-1.13.1-1ubuntu2~0.10.04.2
openjdk-6-jre-zero 6b30-1.13.1-1ubuntu2~0.10.04.2
After a standard system update you need to restart any Java applications or
applets to make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2124-2
http://www.ubuntu.com/usn/usn-2124-1
https://launchpad.net/bugs/1295987
Package Information:
https://launchpad.net/ubuntu/+source/openjdk-6/6b30-1.13.1-1ubuntu2~0.12.04.3
https://launchpad.net/ubuntu/+source/openjdk-6/6b30-1.13.1-1ubuntu2~0.10.04.2
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 884 bytes
Desc: OpenPGP digital signature
URL: <http://listas.trisquel.info/pipermail/trisquel-security/attachments/20140407/1c6b8355/attachment-0001.pgp>
-------------- next part --------------
--
ubuntu-security-announce mailing list
ubuntu-security-announce at lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
More information about the Trisquel-security
mailing list