Risks
Advisories
Browse
or
or
Ubuntu Security Notice - openjdk-6 vulnerabilities (USN-1908-1)
==========================================================================
Ubuntu Security Notice USN-1908-1
July 23, 2013

openjdk-6 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 12.04 LTS
- Ubuntu 10.04 LTS

Summary:

Several security issues were fixed in OpenJDK 6.

Software Description:
- openjdk-6: Open Source Java implementation

Details:

Several vulnerabilities were discovered in the OpenJDK JRE related to
information disclosure and data integrity. An attacker could exploit these
to expose sensitive data over the network. (CVE-2013-1500, CVE-2013-2454,
CVE-2013-2458)

A vulnerability was discovered in the OpenJDK Javadoc related to data
integrity. (CVE-2013-1571)

A vulnerability was discovered in the OpenJDK JRE related to information
disclosure and availability. An attacker could exploit this to cause a
denial of service or expose sensitive data over the network.
(CVE-2013-2407)

Several vulnerabilities were discovered in the OpenJDK JRE related to
information disclosure. An attacker could exploit these to expose sensitive
data over the network. (CVE-2013-2412, CVE-2013-2443, CVE-2013-2446,
CVE-2013-2447, CVE-2013-2449, CVE-2013-2452, CVE-2013-2456)

Several vulnerabilities were discovered in the OpenJDK JRE related to
availability. An attacker could exploit these to cause a denial of service.
(CVE-2013-2444, CVE-2013-2445, CVE-2013-2450)

Several vulnerabilities were discovered in the OpenJDK JRE related to
information disclosure, data integrity and availability. An attacker could
exploit these to cause a denial of service or expose sensitive data over
the network. (CVE-2013-2448, CVE-2013-2451, CVE-2013-2459, CVE-2013-2461,
CVE-2013-2463, CVE-2013-2465, CVE-2013-2469, CVE-2013-2470, CVE-2013-2471,
CVE-2013-2472, CVE-2013-2473, CVE-2013-3743)

Several vulnerabilities were discovered in the OpenJDK JRE related to data
integrity. (CVE-2013-2453, CVE-2013-2455, CVE-2013-2457)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.04 LTS:
  icedtea-6-jre-cacao             6b27-1.12.6-1ubuntu0.12.04.2
  icedtea-6-jre-jamvm             6b27-1.12.6-1ubuntu0.12.04.2
  openjdk-6-doc                   6b27-1.12.6-1ubuntu0.12.04.2
  openjdk-6-jre                   6b27-1.12.6-1ubuntu0.12.04.2
  openjdk-6-jre-headless          6b27-1.12.6-1ubuntu0.12.04.2
  openjdk-6-jre-lib               6b27-1.12.6-1ubuntu0.12.04.2
  openjdk-6-jre-zero              6b27-1.12.6-1ubuntu0.12.04.2

Ubuntu 10.04 LTS:
  icedtea-6-jre-cacao             6b27-1.12.6-1ubuntu0.10.04.2
  openjdk-6-doc                   6b27-1.12.6-1ubuntu0.10.04.2
  openjdk-6-jre                   6b27-1.12.6-1ubuntu0.10.04.2
  openjdk-6-jre-headless          6b27-1.12.6-1ubuntu0.10.04.2
  openjdk-6-jre-lib               6b27-1.12.6-1ubuntu0.10.04.2
  openjdk-6-jre-zero              6b27-1.12.6-1ubuntu0.10.04.2

This update uses a new upstream release, which includes additional bug
fixes. After a standard system update you need to restart any Java
applications or applets to make all the necessary changes.

References:
  http://www.ubuntu.com/usn/usn-1908-1
  CVE-2013-1500, CVE-2013-1571, CVE-2013-2407, CVE-2013-2412,
  CVE-2013-2443, CVE-2013-2444, CVE-2013-2445, CVE-2013-2446,
  CVE-2013-2447, CVE-2013-2448, CVE-2013-2449, CVE-2013-2450,
  CVE-2013-2451, CVE-2013-2452, CVE-2013-2453, CVE-2013-2454,
  CVE-2013-2455, CVE-2013-2456, CVE-2013-2457, CVE-2013-2458,
  CVE-2013-2459, CVE-2013-2461, CVE-2013-2463, CVE-2013-2465,
  CVE-2013-2469, CVE-2013-2470, CVE-2013-2471, CVE-2013-2472,
  CVE-2013-2473, CVE-2013-3743

Package Information:
  https://launchpad.net/ubuntu/+source/openjdk-6/6b27-1.12.6-1ubuntu0.12.04.2
  https://launchpad.net/ubuntu/+source/openjdk-6/6b27-1.12.6-1ubuntu0.10.04.2




Spotlight

Patching: The least understood line of defense

Posted on 29 August 2014.  |  How many end users, indeed how many IT pros, truly get patching? Sure, many of us see Windows install updates when we shut down our PC and think all is well. Itís not.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Tue, Sep 2nd
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //