|
|
Subscribe / Log in / New account

Ubuntu alert USN-2923-1 (bsh)

From:  Marc Deslauriers <marc.deslauriers@canonical.com>
To:  ubuntu-security-announce@lists.ubuntu.com
Subject:  [USN-2923-1] BeanShell vulnerability
Date:  Tue, 8 Mar 2016 09:21:23 -0500
Message-ID:  <56DEDFE3.7040401@canonical.com>

========================================================================== Ubuntu Security Notice USN-2923-1 March 08, 2016 bsh vulnerability ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 15.10 - Ubuntu 14.04 LTS - Ubuntu 12.04 LTS Summary: BeanShell could be made to run programs if it processed specially crafted input. Software Description: - bsh: Java scripting environment Details: Alvaro Muñoz and Christian Schneider discovered that BeanShell incorrectly handled deserialization. A remote attacker could possibly use this issue to execute arbitrary code. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 15.10: bsh 2.0b4-15ubuntu0.15.10.1 libbsh-java 2.0b4-15ubuntu0.15.10.1 Ubuntu 14.04 LTS: bsh 2.0b4-15ubuntu0.14.04.1 libbsh-java 2.0b4-15ubuntu0.14.04.1 Ubuntu 12.04 LTS: bsh 2.0b4-12ubuntu0.1 bsh-gcj 2.0b4-12ubuntu0.1 In general, a standard system update will make all the necessary changes. References: http://www.ubuntu.com/usn/usn-2923-1 CVE-2016-2510 Package Information: https://launchpad.net/ubuntu/+source/bsh/2.0b4-15ubuntu0.... https://launchpad.net/ubuntu/+source/bsh/2.0b4-15ubuntu0.... https://launchpad.net/ubuntu/+source/bsh/2.0b4-12ubuntu0.1 -- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security...


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds