Ubuntu alert USN-2923-1 (bsh)
From: | Marc Deslauriers <marc.deslauriers@canonical.com> | |
To: | ubuntu-security-announce@lists.ubuntu.com | |
Subject: | [USN-2923-1] BeanShell vulnerability | |
Date: | Tue, 8 Mar 2016 09:21:23 -0500 | |
Message-ID: | <56DEDFE3.7040401@canonical.com> |
========================================================================== Ubuntu Security Notice USN-2923-1 March 08, 2016 bsh vulnerability ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 15.10 - Ubuntu 14.04 LTS - Ubuntu 12.04 LTS Summary: BeanShell could be made to run programs if it processed specially crafted input. Software Description: - bsh: Java scripting environment Details: Alvaro Muñoz and Christian Schneider discovered that BeanShell incorrectly handled deserialization. A remote attacker could possibly use this issue to execute arbitrary code. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 15.10: bsh 2.0b4-15ubuntu0.15.10.1 libbsh-java 2.0b4-15ubuntu0.15.10.1 Ubuntu 14.04 LTS: bsh 2.0b4-15ubuntu0.14.04.1 libbsh-java 2.0b4-15ubuntu0.14.04.1 Ubuntu 12.04 LTS: bsh 2.0b4-12ubuntu0.1 bsh-gcj 2.0b4-12ubuntu0.1 In general, a standard system update will make all the necessary changes. References: http://www.ubuntu.com/usn/usn-2923-1 CVE-2016-2510 Package Information: https://launchpad.net/ubuntu/+source/bsh/2.0b4-15ubuntu0.... https://launchpad.net/ubuntu/+source/bsh/2.0b4-15ubuntu0.... https://launchpad.net/ubuntu/+source/bsh/2.0b4-12ubuntu0.1 -- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security...