[USN-2124-2] OpenJDK 6 regression

Jamie Strandboge jamie at canonical.com
Tue Apr 8 02:38:38 UTC 2014


==========================================================================
Ubuntu Security Notice USN-2124-2
April 08, 2014

openjdk-6 regression
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 12.04 LTS
- Ubuntu 10.04 LTS

Summary:

USN-2124-1 introduced a regression in OpenJDK 6.

Software Description:
- openjdk-6: Open Source Java implementation

Details:

USN-2124-1 fixed vulnerabilities in OpenJDK 6. Due to an upstream
regression, memory was not properly zeroed under certain circumstances
which could lead to instability. This update fixes the problem.

We apologize for the inconvenience.

Original advisory details:

 A vulnerability was discovered in the OpenJDK JRE related to information
 disclosure and data integrity. An attacker could exploit this to expose
 sensitive data over the network. (CVE-2014-0411)

 Several vulnerabilities were discovered in the OpenJDK JRE related to
 information disclosure, data integrity and availability. An attacker could
 exploit these to cause a denial of service or expose sensitive data over
 the network. (CVE-2013-5878, CVE-2013-5907, CVE-2014-0373, CVE-2014-0422,
 CVE-2014-0428)

 Two vulnerabilities were discovered in the OpenJDK JRE related to
 information disclosure. An attacker could exploit these to expose sensitive
 data over the network. (CVE-2013-5884, CVE-2014-0368)

 Two vulnerabilities were discovered in the OpenJDK JRE related to
 availability. An attacker could exploit these to cause a denial of service.
 (CVE-2013-5896, CVE-2013-5910)

 Two vulnerabilities were discovered in the OpenJDK JRE related to data
 integrity. (CVE-2014-0376, CVE-2014-0416)

 A vulnerability was discovered in the OpenJDK JRE related to information
 disclosure and availability. An attacker could exploit this to expose
 sensitive data over the network or cause a denial of service.
 (CVE-2014-0423)

 In addition to the above, USN-2033-1 fixed several vulnerabilities and bugs
 in OpenJDK 6. This update introduced a regression which caused an exception
 condition in javax.xml when instantiating encryption algorithms. This
 update fixes the problem. We apologize for the inconvenience.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.04 LTS:
  icedtea-6-jre-cacao             6b30-1.13.1-1ubuntu2~0.12.04.3
  icedtea-6-jre-jamvm             6b30-1.13.1-1ubuntu2~0.12.04.3
  openjdk-6-jre                   6b30-1.13.1-1ubuntu2~0.12.04.3
  openjdk-6-jre-headless          6b30-1.13.1-1ubuntu2~0.12.04.3
  openjdk-6-jre-lib               6b30-1.13.1-1ubuntu2~0.12.04.3
  openjdk-6-jre-zero              6b30-1.13.1-1ubuntu2~0.12.04.3

Ubuntu 10.04 LTS:
  icedtea-6-jre-cacao             6b30-1.13.1-1ubuntu2~0.10.04.2
  openjdk-6-jre                   6b30-1.13.1-1ubuntu2~0.10.04.2
  openjdk-6-jre-headless          6b30-1.13.1-1ubuntu2~0.10.04.2
  openjdk-6-jre-lib               6b30-1.13.1-1ubuntu2~0.10.04.2
  openjdk-6-jre-zero              6b30-1.13.1-1ubuntu2~0.10.04.2

After a standard system update you need to restart any Java applications or
applets to make all the necessary changes.

References:
  http://www.ubuntu.com/usn/usn-2124-2
  http://www.ubuntu.com/usn/usn-2124-1
  https://launchpad.net/bugs/1295987

Package Information:
  https://launchpad.net/ubuntu/+source/openjdk-6/6b30-1.13.1-1ubuntu2~0.12.04.3
  https://launchpad.net/ubuntu/+source/openjdk-6/6b30-1.13.1-1ubuntu2~0.10.04.2




-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 884 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20140407/1c6b8355/attachment.pgp>


More information about the ubuntu-security-announce mailing list