This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --4DlocLBxC3cajX4RnQ4gLqtCJ2jDocpAt Content-Type: multipart/mixed; boundary="fudLLC30mSutN0ARdLLXNb08R110uwjVR"; protected-headers="v1" From: Aaron Bauman <bman@gentoo.org> To: gentoo-announce@lists.gentoo.org Message-ID: <4dafb30c-7174-2eed-b3d2-f4a165565dbc@gentoo.org> Subject: [ GLSA 201611-04 ] Oracle JRE/JDK: Multiple vulnerabilities
--fudLLC30mSutN0ARdLLXNb08R110uwjVR Content-Type: multipart/alternative; boundary="------------8F2599C470D7BB7AFE6E1ED9"
This is a multi-part message in MIME format. --------------8F2599C470D7BB7AFE6E1ED9 Content-Type: text/plain; charset=utf- Content-Transfer-Encoding: quoted-printable
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201611-04 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal Title: Oracle JRE/JDK: Multiple vulnerabilities Date: November 04, 2016 Bugs: #597516 ID: 201611-04
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis ========
Multiple vulnerabilities have been found in Oracle's JRE and JDK software suites allowing remote attackers to remotely execute arbitrary code, obtain information, and cause Denial of Service.
Background ==========
Java Platform, Standard Edition (Java SE) lets you develop and deploy Java applications on desktops and servers, as well as in todayâs demanding embedded environments. Java offers the rich user interface, performance, versatility, portability, and security that todayâs applications require.
Affected packages =================
------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 dev-java/oracle-jre-bin < 1.8.0.111 >= 1.8.0.111 2 dev-java/oracle-jdk-bin < 1.8.0.111 >= 1.8.0.111 ------------------------------------------------------------------- 2 affected packages
Description ===========
Multiple vulnerabilities exist in both Oracleâs JRE and JDK. Please review the referenced CVEâs for additional information.
Impact ======
Remote attackers could gain access to information, remotely execute arbitrary code, or cause Denial of Service.
Workaround ==========
There is no known workaround at this time.
Resolution ==========
All Oracle JRE Users users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot -v ">=dev-java/oracle-jre-bin-1.8.0.111"
All Oracle JDK Users users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot -v ">=dev-java/oracle-jdk-bin-1.8.0.111"
References ==========
[ 1 ] CVE-2016-5542 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5542 [ 2 ] CVE-2016-5554 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5554 [ 3 ] CVE-2016-5556 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5556 [ 4 ] CVE-2016-5568 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5568 [ 5 ] CVE-2016-5573 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5573 [ 6 ] CVE-2016-5582 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5582 [ 7 ] CVE-2016-5597 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5597
Availability ============
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
https://security.gentoo.org/glsa/201611-04
Concerns? =========
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License =======
Copyright 2016 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
--------------8F2599C470D7BB7AFE6E1ED9 Content-Type: text/html; charset=utf-8 Content-Transfer-Encoding: quoted-printable
<html> <head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dutf= -8"> </head> <body bgcolor=3D"#FFFFFF" text=3D"#000000"> <p> <meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Du= tf-8"> </p> <pre style=3D"color: rgb(0, 0, 0); font-style: normal; font-variant-l= igatures: normal; font-variant-caps: normal; font-weight: normal; letter-= spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-tr= ansform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0= px; word-wrap: break-word; white-space: pre-wrap;">- - - - - - - - - - - = - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201611-04 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - <a class=3D"moz-txt-link-freet= ext" href=3D"https://security.gentoo.org/">https://security.gentoo.org/</= a> - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal Title: Oracle JRE/JDK: Multiple vulnerabilities Date: November 04, 2016 Bugs: #597516 ID: 201611-04
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis =3D=3D=3D=3D=3D=3D=3D=3D
Multiple vulnerabilities have been found in Oracle's JRE and JDK software suites allowing remote attackers to remotely execute arbitrary code, obtain information, and cause Denial of Service.
Background =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Java Platform, Standard Edition (Java SE) lets you develop and deploy Java applications on desktops and servers, as well as in today=E2=80=99s demanding embedded environments. Java offers the rich user interface, performance, versatility, portability, and security that today=E2=80=99s applications require.
Affected packages =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 dev-java/oracle-jre-bin < 1.8.0.111 >=3D 1.8.0= =2E111=20 2 dev-java/oracle-jdk-bin < 1.8.0.111 >=3D 1.8.0= =2E111=20 ------------------------------------------------------------------- 2 affected packages
Description =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Multiple vulnerabilities exist in both Oracle=E2=80=99s JRE and JDK. Plea= se review the referenced CVE=E2=80=99s for additional information.
Impact =3D=3D=3D=3D=3D=3D
Remote attackers could gain access to information, remotely execute arbitrary code, or cause Denial of Service.
Workaround =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
There is no known workaround at this time.
Resolution =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
All Oracle JRE Users users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot -v ">=3Ddev-java/oracle-jre-bin-1.8.0.111"
All Oracle JDK Users users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot -v ">=3Ddev-java/oracle-jdk-bin-1.8.0.111"
References =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
[ 1 ] CVE-2016-5542 <a class=3D"moz-txt-link-freetext" href=3D"http://nvd.nist.gov/nvd.= cfm?cvename=3DCVE-2016-5542">http://nvd.nist.gov/nvd.cfm?cvename=3DCVE-20= 16-5542</a> [ 2 ] CVE-2016-5554 <a class=3D"moz-txt-link-freetext" href=3D"http://nvd.nist.gov/nvd.= cfm?cvename=3DCVE-2016-5554">http://nvd.nist.gov/nvd.cfm?cvename=3DCVE-20= 16-5554</a> [ 3 ] CVE-2016-5556 <a class=3D"moz-txt-link-freetext" href=3D"http://nvd.nist.gov/nvd.= cfm?cvename=3DCVE-2016-5556">http://nvd.nist.gov/nvd.cfm?cvename=3DCVE-20= 16-5556</a> [ 4 ] CVE-2016-5568 <a class=3D"moz-txt-link-freetext" href=3D"http://nvd.nist.gov/nvd.= cfm?cvename=3DCVE-2016-5568">http://nvd.nist.gov/nvd.cfm?cvename=3DCVE-20= 16-5568</a> [ 5 ] CVE-2016-5573 <a class=3D"moz-txt-link-freetext" href=3D"http://nvd.nist.gov/nvd.= cfm?cvename=3DCVE-2016-5573">http://nvd.nist.gov/nvd.cfm?cvename=3DCVE-20= 16-5573</a> [ 6 ] CVE-2016-5582 <a class=3D"moz-txt-link-freetext" href=3D"http://nvd.nist.gov/nvd.= cfm?cvename=3DCVE-2016-5582">http://nvd.nist.gov/nvd.cfm?cvename=3DCVE-20= 16-5582</a> [ 7 ] CVE-2016-5597 <a class=3D"moz-txt-link-freetext" href=3D"http://nvd.nist.gov/nvd.= cfm?cvename=3DCVE-2016-5597">http://nvd.nist.gov/nvd.cfm?cvename=3DCVE-20= 16-5597</a>
Availability =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
<a class=3D"moz-txt-link-freetext" href=3D"https://security.gentoo.org/g= lsa/201611-04">https://security.gentoo.org/glsa/201611-04</a>
Concerns? =3D=3D=3D=3D=3D=3D=3D=3D=3D
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to <a class=3D"moz-txt-link-abbreviated" href=3D"mailto:security@gentoo.org"= >security@gentoo.org</a> or alternatively, you may file a bug at <a class=3D"moz-txt-link-freetext" href=3D"https://bugs.gentoo.org">https= ://bugs.gentoo.org</a>.
License =3D=3D=3D=3D=3D=3D=3D
Copyright 2016 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
<a class=3D"moz-txt-link-freetext" href=3D"http://creativecommons.org/lic= enses/by-sa/2.5">http://creativecommons.org/licenses/by-sa/2.5</a></pre> </body> </html>
--------------8F2599C470D7BB7AFE6E1ED9--
--fudLLC30mSutN0ARdLLXNb08R110uwjVR--
--4DlocLBxC3cajX4RnQ4gLqtCJ2jDocpAt Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE----- Version: GnuPG v2
iQJ8BAEBCgBmBQJYHEbiXxSAAAAAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w ZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXQ1OTcyRDI4NDhFOEE0NDYwRTdERTY4QUM5 RjI4QkQ4QkQxRTM5NUZGAAoJEJ8ovYvR45X/rxAP/A7I4pDh17hilpTushmV8psi lOL+zzPBQNfQOBuPWZj018yt5BepO429qi+k/i+4//Cq+JAugCbNPZ5eoMrh5KrW S9exapxlzlThbVbWqkBDZ55Go6Hc5UeTZx4pWbpzDbqyG0vyDemD6F8WU6y+zGbm xya9Y+YGy5B4AyC5PIgAa0ydsaASIaAZQO23XILcfdTnVm1EzOZMONfZ3Zk1bRVr PWUkIwJOG3noQKdAz7vNxlIHzHSuNegqt9nXR918TS33UXDlvG+z1sQ9dqBawLdh AnXZf+TGmv7qLa7jSZHK/NUNNZKAataDEn1HzJYyApaORpNmetXGGWc9z7OQTi6R H7vKyZ1mMsTX/stRo5WOl0UoDpVI0YftpUN1o6WSF5KJ8MkExg6/awdyQJ78XY7o ptupLTvdBDaP2Bu1+vpeRNxvHInDW6riIt8svfMC8E531uBdfdC3g9Sy0b2jbSHo VYQ1OOMg2Bu1a5/p6I/3NJZfKdLY4+MwTz5Wt0LMHMogVaMAZ7NqzRyQA9mHn29c 6CieL5U4gEjNX6pw3E/uwFs70ShyKmsD3gHaXvRyzf3NN3ucu+TlwFV8Sg3FjkGE bUlGNOOlwfXK9X78MOWin0Ud+YpqOTxBxqCo63qeQN0Sh3Dnr5jswZMpwwLUiQnV x/OtLFG1mOpFVdnPYPqs =lTQl -----END PGP SIGNATURE-----
--4DlocLBxC3cajX4RnQ4gLqtCJ2jDocpAt--
|