Login
Newsletter
Werbung

Sicherheit: Ausführen beliebiger Kommandos in OpenJDK
Aktuelle Meldungen Distributionen
Name: Ausführen beliebiger Kommandos in OpenJDK
ID: USN-2818-1
Distribution: Ubuntu
Plattformen: Ubuntu 14.04 LTS, Ubuntu 15.04, Ubuntu 15.10
Datum: Mi, 25. November 2015, 22:07
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4871
Applikationen: OpenJDK

Originalnachricht


--===============2095954160522877125==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="d6Gm4EdcadzBjdND"
Content-Disposition: inline


--d6Gm4EdcadzBjdND
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline

==========================================================================
Ubuntu Security Notice USN-2818-1
November 25, 2015

openjdk-7 vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 15.10
- Ubuntu 15.04
- Ubuntu 14.04 LTS

Summary:

A security issue was fixed in OpenJDK 7.

Software Description:
- openjdk-7: Open Source Java implementation

Details:

It was discovered that rebinding of the receiver of a
DirectMethodHandle may allow a protected method to be accessed. Am
attacker could use this to expose sensitive information or possibly
execute arbitrary code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 15.10:
icedtea-7-jre-jamvm 7u91-2.6.3-0ubuntu0.15.10.1
openjdk-7-jre 7u91-2.6.3-0ubuntu0.15.10.1
openjdk-7-jre-headless 7u91-2.6.3-0ubuntu0.15.10.1
openjdk-7-jre-lib 7u91-2.6.3-0ubuntu0.15.10.1
openjdk-7-jre-zero 7u91-2.6.3-0ubuntu0.15.10.1

Ubuntu 15.04:
icedtea-7-jre-jamvm 7u91-2.6.3-0ubuntu0.15.04.1
openjdk-7-jre 7u91-2.6.3-0ubuntu0.15.04.1
openjdk-7-jre-headless 7u91-2.6.3-0ubuntu0.15.04.1
openjdk-7-jre-lib 7u91-2.6.3-0ubuntu0.15.04.1
openjdk-7-jre-zero 7u91-2.6.3-0ubuntu0.15.04.1

Ubuntu 14.04 LTS:
icedtea-7-jre-jamvm 7u91-2.6.3-0ubuntu0.14.04.1
openjdk-7-jre 7u91-2.6.3-0ubuntu0.14.04.1
openjdk-7-jre-headless 7u91-2.6.3-0ubuntu0.14.04.1
openjdk-7-jre-lib 7u91-2.6.3-0ubuntu0.14.04.1
openjdk-7-jre-zero 7u91-2.6.3-0ubuntu0.14.04.1

After a standard system update you need to restart any Java
applications or applets to make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2818-1
CVE-2015-4871

Package Information:
https://launchpad.net/ubuntu/+source/openjdk-7/7u91-2.6.3-0ubuntu0.15.10.1
https://launchpad.net/ubuntu/+source/openjdk-7/7u91-2.6.3-0ubuntu0.15.04.1
https://launchpad.net/ubuntu/+source/openjdk-7/7u91-2.6.3-0ubuntu0.14.04.1


--d6Gm4EdcadzBjdND
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Digital signature

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=mhoS
-----END PGP SIGNATURE-----

--d6Gm4EdcadzBjdND--


--===============2095954160522877125==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

--===============2095954160522877125==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung