Ubuntu 1735-1: OpenJDK vulnerabilities

    Date 21 Feb 2013
    52
    Posted By LinuxSecurity Advisories
    Several security issues were fixed in OpenJDK.
    
    ==========================================================================
    Ubuntu Security Notice USN-1735-1
    February 21, 2013
    
    openjdk-6, openjdk-7 vulnerabilities
    ==========================================================================
    
    A security issue affects these releases of Ubuntu and its derivatives:
    
    - Ubuntu 12.10
    - Ubuntu 12.04 LTS
    - Ubuntu 11.10
    - Ubuntu 10.04 LTS
    
    Summary:
    
    Several security issues were fixed in OpenJDK.
    
    Software Description:
    - openjdk-7: Open Source Java implementation
    - openjdk-6: Open Source Java implementation
    
    Details:
    
    Nadhem Alfardan and Kenny Paterson discovered that the TLS protocol as used
    in OpenSSL was vulnerable to a timing side-channel attack known as the
    "Lucky Thirteen" issue. A remote attacker could use this issue to perform
    plaintext-recovery attacks via analysis of timing data. (CVE-2013-0169)
    
    A vulnerability was discovered in the OpenJDK JRE related to information
    disclosure and data integrity. An attacker could exploit this to cause a
    denial of service. This issue only affected Ubuntu 12.10. (CVE-2013-1484)
    
    A data integrity vulnerability was discovered in the OpenJDK JRE. This
    issue only affected Ubuntu 12.10. (CVE-2013-1485)
    
    Two vulnerabilities were discovered in the OpenJDK JRE related to
    information disclosure and data integrity. An attacker could exploit these
    to cause a denial of service. (CVE-2013-1486, CVE-2013-1487)
    
    Update instructions:
    
    The problem can be corrected by updating your system to the following
    package versions:
    
    Ubuntu 12.10:
      icedtea-7-jre-cacao             7u15-2.3.7-0ubuntu1~12.10
      icedtea-7-jre-jamvm             7u15-2.3.7-0ubuntu1~12.10
      openjdk-7-jre                   7u15-2.3.7-0ubuntu1~12.10
      openjdk-7-jre-headless          7u15-2.3.7-0ubuntu1~12.10
      openjdk-7-jre-lib               7u15-2.3.7-0ubuntu1~12.10
      openjdk-7-jre-zero              7u15-2.3.7-0ubuntu1~12.10
    
    Ubuntu 12.04 LTS:
      icedtea-6-jre-cacao             6b27-1.12.3-0ubuntu1~12.04
      icedtea-6-jre-jamvm             6b27-1.12.3-0ubuntu1~12.04
      openjdk-6-jre                   6b27-1.12.3-0ubuntu1~12.04
      openjdk-6-jre-headless          6b27-1.12.3-0ubuntu1~12.04
      openjdk-6-jre-lib               6b27-1.12.3-0ubuntu1~12.04
      openjdk-6-jre-zero              6b27-1.12.3-0ubuntu1~12.04
    
    Ubuntu 11.10:
      icedtea-6-jre-cacao             6b27-1.12.3-0ubuntu1~11.10
      icedtea-6-jre-jamvm             6b27-1.12.3-0ubuntu1~11.10
      openjdk-6-jre                   6b27-1.12.3-0ubuntu1~11.10
      openjdk-6-jre-headless          6b27-1.12.3-0ubuntu1~11.10
      openjdk-6-jre-lib               6b27-1.12.3-0ubuntu1~11.10
      openjdk-6-jre-zero              6b27-1.12.3-0ubuntu1~11.10
    
    Ubuntu 10.04 LTS:
      icedtea-6-jre-cacao             6b27-1.12.3-0ubuntu1~10.04
      openjdk-6-jre                   6b27-1.12.3-0ubuntu1~10.04
      openjdk-6-jre-headless          6b27-1.12.3-0ubuntu1~10.04
      openjdk-6-jre-lib               6b27-1.12.3-0ubuntu1~10.04
      openjdk-6-jre-zero              6b27-1.12.3-0ubuntu1~10.04
    
    This update uses a new upstream release which includes additional bug
    fixes. After a standard system update you need to restart any Java
    applications or applets to make all the necessary changes.
    
    References:
      https://www.ubuntu.com/usn/usn-1735-1
      CVE-2013-0169, CVE-2013-1484, CVE-2013-1485, CVE-2013-1486,
      CVE-2013-1487
    
    Package Information:
      https://launchpad.net/ubuntu/+source/openjdk-7/7u15-2.3.7-0ubuntu1~12.10
      https://launchpad.net/ubuntu/+source/openjdk-6/6b27-1.12.3-0ubuntu1~12.04
      https://launchpad.net/ubuntu/+source/openjdk-6/6b27-1.12.3-0ubuntu1~11.10
      https://launchpad.net/ubuntu/+source/openjdk-6/6b27-1.12.3-0ubuntu1~10.04
    
    
    
    
    

    LinuxSecurity Poll

    Do you feel that the Lawful Access to Encrypted Data Act, which aims to force encryption backdoors, is a threat to US citizens' privacy?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/30-do-you-feel-that-the-lawful-access-to-encrypted-data-act-which-aims-to-force-encryption-backdoors-is-a-threat-to-privacy?task=poll.vote&format=json
    30
    radio
    [{"id":"106","title":"Yes - I am a privacy advocate and I am strongly opposed to this bill.","votes":"19","type":"x","order":"1","pct":95,"resources":[]},{"id":"107","title":"I'm undecided - it has its pros and cons.","votes":"1","type":"x","order":"2","pct":5,"resources":[]},{"id":"108","title":"No - I support this bill and feel that it will help protect against crime and threats to our national security. ","votes":"0","type":"x","order":"3","pct":0,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350
    bottom 200

    Advisories

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.