You are here
Home > Preporuke > Nadogradnja za openjdk-7

Nadogradnja za openjdk-7

==========================================================================
Ubuntu Security Notice USN-2784-1
October 28, 2015

openjdk-7 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 15.10
– Ubuntu 15.04
– Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in OpenJDK 7.

Software Description:
– openjdk-7: Open Source Java implementation

Details:

Multiple vulnerabilities were discovered in the OpenJDK JRE related to
information disclosure, data integrity and availability. An attacker
could exploit these to cause a denial of service or expose sensitive
data over the network. (CVE-2015-4805, CVE-2015-4835, CVE-2015-4843,
CVE-2015-4844, CVE-2015-4860, CVE-2015-4868, CVE-2015-4881,
CVE-2015-4883)

A vulnerability was discovered in the OpenJDK JRE related to
information disclosure and data integrity. An attacker could exploit
this to expose sensitive data over the network. (CVE-2015-4806)

A vulnerability was discovered in the OpenJDK JRE related to data
integrity. An attacker could exploit this expose sensitive data over
the network. (CVE-2015-4872)

Multiple vulnerabilities were discovered in the OpenJDK JRE related
to information disclosure. An attacker could exploit these to expose
sensitive data over the network. (CVE-2015-4734, CVE-2015-4840,
CVE-2015-4842, CVE-2015-4903)

Multiple vulnerabilities were discovered in the OpenJDK JRE related
to availability. An attacker could exploit these to cause a denial of
service. (CVE-2015-4803, CVE-2015-4882, CVE-2015-4893, CVE-2015-4911)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 15.10:
icedtea-7-jre-jamvm 7u85-2.6.1-5ubuntu0.15.10.1
openjdk-7-jre 7u85-2.6.1-5ubuntu0.15.10.1
openjdk-7-jre-headless 7u85-2.6.1-5ubuntu0.15.10.1
openjdk-7-jre-lib 7u85-2.6.1-5ubuntu0.15.10.1
openjdk-7-jre-zero 7u85-2.6.1-5ubuntu0.15.10.1

Ubuntu 15.04:
icedtea-7-jre-jamvm 7u85-2.6.1-5ubuntu0.15.04.1
openjdk-7-jre 7u85-2.6.1-5ubuntu0.15.04.1
openjdk-7-jre-headless 7u85-2.6.1-5ubuntu0.15.04.1
openjdk-7-jre-lib 7u85-2.6.1-5ubuntu0.15.04.1
openjdk-7-jre-zero 7u85-2.6.1-5ubuntu0.15.04.1

Ubuntu 14.04 LTS:
icedtea-7-jre-jamvm 7u85-2.6.1-5ubuntu0.14.04.1
openjdk-7-jre 7u85-2.6.1-5ubuntu0.14.04.1
openjdk-7-jre-headless 7u85-2.6.1-5ubuntu0.14.04.1
openjdk-7-jre-lib 7u85-2.6.1-5ubuntu0.14.04.1
openjdk-7-jre-zero 7u85-2.6.1-5ubuntu0.14.04.1

This update uses a new upstream release, which includes additional
bug fixes. After a standard system update you need to restart any
Java applications or applets to make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2784-1
CVE-2015-4734, CVE-2015-4803, CVE-2015-4805, CVE-2015-4806,
CVE-2015-4835, CVE-2015-4840, CVE-2015-4842, CVE-2015-4843,
CVE-2015-4844, CVE-2015-4860, CVE-2015-4868, CVE-2015-4872,
CVE-2015-4881, CVE-2015-4882, CVE-2015-4883, CVE-2015-4893,
CVE-2015-4903, CVE-2015-4911

Package Information:
https://launchpad.net/ubuntu/+source/openjdk-7/7u85-2.6.1-5ubuntu0.15.10.1
https://launchpad.net/ubuntu/+source/openjdk-7/7u85-2.6.1-5ubuntu0.15.04.1
https://launchpad.net/ubuntu/+source/openjdk-7/7u85-2.6.1-5ubuntu0.14.04.1

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
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=mbCw
—–END PGP SIGNATURE—–

Top
More in Preporuke
Sigurnosni propust programskog paketa kubernetes

Otkriven je sigurnosni propust u programskom paketu kubernetes za Red Hat OpenShift Enterprise 3.0 uzrokovan neuspješnim projeravanjem tipova naziva objekata...

Close