You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa openjdk-7

Sigurnosni nedostaci programskog paketa openjdk-7

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LUB

==========================================================================
Ubuntu Security Notice USN-2388-1
October 23, 2014

openjdk-7 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in OpenJDK 7.

Software Description:
– openjdk-7: Open Source Java implementation

Details:

A vulnerability was discovered in the OpenJDK JRE related to information
disclosure and data integrity. An attacker could exploit this to expose
sensitive data over the network. (CVE-2014-6457)

Several vulnerabilities were discovered in the OpenJDK JRE related to data
integrity. (CVE-2014-6502, CVE-2014-6512, CVE-2014-6519, CVE-2014-6527,
CVE-2014-6558)

Several vulnerabilities were discovered in the OpenJDK JRE related to
information disclosure. An attacker could exploit these to expose sensitive
data over the network. (CVE-2014-6504, CVE-2014-6511, CVE-2014-6517,
CVE-2014-6531)

Two vulnerabilities were discovered in the OpenJDK JRE related to
information disclosure, data integrity and availability. An attacker could
exploit these to cause a denial of service or expose sensitive data over
the network. (CVE-2014-6506, CVE-2014-6513)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.04 LTS:
icedtea-7-jre-jamvm 7u71-2.5.3-0ubuntu0.14.04.1
openjdk-7-jre 7u71-2.5.3-0ubuntu0.14.04.1
openjdk-7-jre-headless 7u71-2.5.3-0ubuntu0.14.04.1
openjdk-7-jre-lib 7u71-2.5.3-0ubuntu0.14.04.1
openjdk-7-jre-zero 7u71-2.5.3-0ubuntu0.14.04.1

This update uses a new upstream release, which includes additional bug
fixes. After a standard system update you need to restart any Java
applications or applets to make all the necessary changes.

This update contains known regressions in the JamVM alternative Java
Virtual Machine and a future update will correct these issues. See
https://launchpad.net/bugs/1382205 for details. We apologize for the
inconvenience.

References:
http://www.ubuntu.com/usn/usn-2388-1
CVE-2014-6457, CVE-2014-6502, CVE-2014-6504, CVE-2014-6506,
CVE-2014-6511, CVE-2014-6512, CVE-2014-6517, CVE-2014-6519,
CVE-2014-6527, CVE-2014-6531, CVE-2014-6558, https://launchpad.net/bugs/1382205

Package Information:
https://launchpad.net/ubuntu/+source/openjdk-7/7u71-2.5.3-0ubuntu0.14.04.1

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
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=9dCq
—–END PGP SIGNATURE—–

AutorMarijo Plepelic
Cert idNCERT-REF-2014-10-0006-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Ranjivost programskog paketa python-backports-ssl_match_hostname

Ustanovljena je ranjivost u načinu kojim je funkcija "ssl.match_hostname()" izvodila provjeru naziva certifikata u slučaju kada sadrži mnogo '*' wildcard...

Close