==========================================================================
Ubuntu Security Notice USN-2312-1
August 12, 2014
openjdk-6 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 12.04 LTS
– Ubuntu 10.04 LTS
Summary:
Several security issues were fixed in OpenJDK 6.
Software Description:
– openjdk-6: Open Source Java implementation
Details:
Several vulnerabilities were discovered in the OpenJDK JRE related to
information disclosure, data integrity and availability. An attacker could
exploit these to cause a denial of service or expose sensitive data over
the network. (CVE-2014-2490, CVE-2014-4216, CVE-2014-4219, CVE-2014-4262)
Several vulnerabilities were discovered in the OpenJDK JRE related to
information disclosure and data integrity. An attacker could exploit these
to expose sensitive data over the network. (CVE-2014-4209, CVE-2014-4244,
CVE-2014-4263)
Two vulnerabilities were discovered in the OpenJDK JRE related to data
integrity. (CVE-2014-4218, CVE-2014-4266)
Two vulnerabilities were discovered in the OpenJDK JRE related to
information disclosure. An attacker could exploit these to expose sensitive
data over the network. (CVE-2014-4252, CVE-2014-4268)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.04 LTS:
icedtea-6-jre-cacao 6b32-1.13.4-4ubuntu0.12.04.2
icedtea-6-jre-jamvm 6b32-1.13.4-4ubuntu0.12.04.2
openjdk-6-jre 6b32-1.13.4-4ubuntu0.12.04.2
openjdk-6-jre-headless 6b32-1.13.4-4ubuntu0.12.04.2
openjdk-6-jre-lib 6b32-1.13.4-4ubuntu0.12.04.2
openjdk-6-jre-zero 6b32-1.13.4-4ubuntu0.12.04.2
Ubuntu 10.04 LTS:
icedtea-6-jre-cacao 6b32-1.13.4-4ubuntu0.10.04.2
openjdk-6-jre 6b32-1.13.4-4ubuntu0.10.04.2
openjdk-6-jre-headless 6b32-1.13.4-4ubuntu0.10.04.2
openjdk-6-jre-lib 6b32-1.13.4-4ubuntu0.10.04.2
openjdk-6-jre-zero 6b32-1.13.4-4ubuntu0.10.04.2
This update uses a new upstream release, which includes additional bug
fixes. After a standard system update you need to restart any Java
applications or applets to make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2312-1
CVE-2014-2490, CVE-2014-4209, CVE-2014-4216, CVE-2014-4218,
CVE-2014-4219, CVE-2014-4244, CVE-2014-4252, CVE-2014-4262,
CVE-2014-4263, CVE-2014-4266, CVE-2014-4268
Package Information:
https://launchpad.net/ubuntu/+source/openjdk-6/6b32-1.13.4-4ubuntu0.12.04.2
https://launchpad.net/ubuntu/+source/openjdk-6/6b32-1.13.4-4ubuntu0.10.04.2
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1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=p46I
—–END PGP SIGNATURE—–
—