Your submission was sent successfully! Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2010-3569

Publication date 19 October 2010

Last updated 24 July 2024


Ubuntu priority

Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, and 1.4.2_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2010 CPU. Oracle has not commented on claims from a reliable downstream vendor that this allows remote attackers to execute arbitrary code by causing the defaultReadObject method in the Serialization API to set a volatile field multiple times.

From the Ubuntu Security Team

It was discovered that the defaultReadObject of the Serialization API could be tricked into setting a volatile field multiple times. This could allow an attacker to execute arbitrary code with the privileges of the user running a java applet or application.

Read the notes from the security team

Status

Package Ubuntu Release Status
openjdk-6 10.10 maverick
Fixed 6b20-1.9.1-1ubuntu3
10.04 LTS lucid
Fixed 1.8.2-4ubuntu2
9.10 karmic
Fixed 1.8.2-4ubuntu1~9.10.1
9.04 jaunty
Fixed 1.8.2-4ubuntu1~9.04.1
8.04 LTS hardy
Fixed 1.8.2-4ubuntu1~8.04.1
6.06 LTS dapper Not in release
openjdk-6b18 10.10 maverick
Fixed 6b18-1.8.2-4ubuntu1
10.04 LTS lucid
Not affected
9.10 karmic
Not affected
8.10 intrepid Not in release
8.04 LTS hardy Not in release
6.06 LTS dapper Not in release
sun-java6 10.10 maverick
Fixed 6.22-0ubuntu1~10.10
10.04 LTS lucid
Fixed 6.22-0ubuntu1~10.04
9.10 karmic
Fixed 6.22-0ubuntu1~9.10.1
9.04 jaunty
Fixed 6.22-0ubuntu1~9.04.1
8.04 LTS hardy
Fixed 6.22-0ubuntu1~8.04.1
6.06 LTS dapper Not in release

Notes


sbeattie

red hat description: defaultReadObject of the Serialization API could be tricked into setting a volatile field multiple times, which could allow a remote attacker to execute arbitrary code with the privileges of the user running the applet or application.

References

Related Ubuntu Security Notices (USN)

    • USN-1010-1
    • OpenJDK vulnerabilities
    • 28 October 2010

Other references