You are here
Home > Preporuke > Nadogradnja za openjdk-7

Nadogradnja za openjdk-7

  • Detalji os-a: LUB
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LUB

==========================================================================
Ubuntu Security Notice USN-2884-1
February 01, 2016

openjdk-7 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 15.10
– Ubuntu 15.04
– Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in OpenJDK 7.

Software Description:
– openjdk-7: Open Source Java implementation

Details:

Multiple vulnerabilities were discovered in the OpenJDK JRE related
to information disclosure, data integrity, and availability. An
attacker could exploit these to cause a denial of service, expose
sensitive data over the network, or possibly execute arbitrary code.
(CVE-2016-0483, CVE-2016-0494)

A vulnerability was discovered in the OpenJDK JRE related to data
integrity. An attacker could exploit this to expose sensitive data
over the network or possibly execute arbitrary code. (CVE-2016-0402)

It was discovered that OpenJDK 7 incorrectly allowed MD5 to be used
for TLS connections. If a remote attacker were able to perform a
man-in-the-middle attack, this flaw could be exploited to expose
sensitive information. (CVE-2015-7575)

A vulnerability was discovered in the OpenJDK JRE related to
information disclosure. An attacker could exploit this to expose
sensitive data over the network. (CVE-2016-0448)

A vulnerability was discovered in the OpenJDK JRE related to
availability. An attacker could exploit this to cause a denial of
service. (CVE-2016-0466)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 15.10:
icedtea-7-jre-jamvm 7u95-2.6.4-0ubuntu0.15.10.1
openjdk-7-jre 7u95-2.6.4-0ubuntu0.15.10.1
openjdk-7-jre-headless 7u95-2.6.4-0ubuntu0.15.10.1
openjdk-7-jre-lib 7u95-2.6.4-0ubuntu0.15.10.1
openjdk-7-jre-zero 7u95-2.6.4-0ubuntu0.15.10.1

Ubuntu 15.04:
icedtea-7-jre-jamvm 7u95-2.6.4-0ubuntu0.15.04.1
openjdk-7-jre 7u95-2.6.4-0ubuntu0.15.04.1
openjdk-7-jre-headless 7u95-2.6.4-0ubuntu0.15.04.1
openjdk-7-jre-lib 7u95-2.6.4-0ubuntu0.15.04.1
openjdk-7-jre-zero 7u95-2.6.4-0ubuntu0.15.04.1

Ubuntu 14.04 LTS:
icedtea-7-jre-jamvm 7u95-2.6.4-0ubuntu0.14.04.1
openjdk-7-jre 7u95-2.6.4-0ubuntu0.14.04.1
openjdk-7-jre-headless 7u95-2.6.4-0ubuntu0.14.04.1
openjdk-7-jre-lib 7u95-2.6.4-0ubuntu0.14.04.1
openjdk-7-jre-zero 7u95-2.6.4-0ubuntu0.14.04.1

This update uses a new upstream release, which includes additional
bug fixes. After a standard system update you need to restart any
Java applications or applets to make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2884-1
CVE-2015-7575, CVE-2016-0402, CVE-2016-0448, CVE-2016-0466,
CVE-2016-0483, CVE-2016-0494

Package Information:
https://launchpad.net/ubuntu/+source/openjdk-7/7u95-2.6.4-0ubuntu0.15.10.1
https://launchpad.net/ubuntu/+source/openjdk-7/7u95-2.6.4-0ubuntu0.15.04.1
https://launchpad.net/ubuntu/+source/openjdk-7/7u95-2.6.4-0ubuntu0.14.04.1

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
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=jr5g
—–END PGP SIGNATURE—–

AutorTomislav Protega
Cert idNCERT-REF-2016-02-0032-ADV
CveCVE-2016-0483 CVE-2016-0494 CVE-2016-0402 CVE-2015-7575 CVE-2016-0448 CVE-2016-0466
ID izvornikaUSN-2884-1
Proizvodopenjdk-7
Izvorhttp://www.ubuntu.com
Top
More in Preporuke
Ranjivosti programskog paketa xulrunner

Otkrivene su ranjivosti programskog paketa xulrunner za openSUSE Leap 42.1. Ranjivosti su posljedica višestrukih nespecificiranih ranjivosti u mehanizmu web preglednika...

Close