Mehrere Probleme in OpenJDK
ID: | USN-2964-1 |
Distribution: | Ubuntu |
Plattformen: | Ubuntu 14.04 LTS, Ubuntu 15.10 |
Datum: | Do, 5. Mai 2016, 10:31 |
Referenzen: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3425 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0695 |
Applikationen: | OpenJDK |
Originalnachricht |
|
--===============5488690259501966355== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="rWhLK7VZz0iBluhq" Content-Disposition: inline --rWhLK7VZz0iBluhq Content-Type: text/plain; charset=us-ascii Content-Disposition: inline ========================================================================== Ubuntu Security Notice USN-2964-1 May 05, 2016 openjdk-7 vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 15.10 - Ubuntu 14.04 LTS Summary: Several security issues were fixed in OpenJDK 7. Software Description: - openjdk-7: Open Source Java implementation Details: Multiple vulnerabilities were discovered in the OpenJDK JRE related to information disclosure, data integrity, and availability. An attacker could exploit these to cause a denial of service, expose sensitive data over the network, or possibly execute arbitrary code. (CVE-2016-0686, CVE-2016-0687, CVE-2016-3427) A vulnerability was discovered in the OpenJDK JRE related to information disclosure. An attacker could exploit this to expose sensitive data over the network. (CVE-2016-0695) A vulnerability was discovered in the OpenJDK JRE related to availability. An attacker could exploit this to cause a denial of service. (CVE-2016-3425) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 15.10: icedtea-7-jre-jamvm 7u101-2.6.6-0ubuntu0.15.10.1 openjdk-7-jdk 7u101-2.6.6-0ubuntu0.15.10.1 openjdk-7-jre 7u101-2.6.6-0ubuntu0.15.10.1 openjdk-7-jre-headless 7u101-2.6.6-0ubuntu0.15.10.1 openjdk-7-jre-lib 7u101-2.6.6-0ubuntu0.15.10.1 openjdk-7-jre-zero 7u101-2.6.6-0ubuntu0.15.10.1 openjdk-7-source 7u101-2.6.6-0ubuntu0.15.10.1 Ubuntu 14.04 LTS: icedtea-7-jre-jamvm 7u101-2.6.6-0ubuntu0.14.04.1 openjdk-7-jdk 7u101-2.6.6-0ubuntu0.14.04.1 openjdk-7-jre 7u101-2.6.6-0ubuntu0.14.04.1 openjdk-7-jre-headless 7u101-2.6.6-0ubuntu0.14.04.1 openjdk-7-jre-lib 7u101-2.6.6-0ubuntu0.14.04.1 openjdk-7-jre-zero 7u101-2.6.6-0ubuntu0.14.04.1 openjdk-7-source 7u101-2.6.6-0ubuntu0.14.04.1 This update uses a new upstream release, which includes additional bug fixes. After a standard system update you need to restart any Java applications or applets to make all the necessary changes. References: http://www.ubuntu.com/usn/usn-2964-1 CVE-2016-0686, CVE-2016-0687, CVE-2016-0695, CVE-2016-3425, CVE-2016-3427 Package Information: https://launchpad.net/ubuntu/+source/openjdk-7/7u101-2.6.6-0ubuntu0.15.10.1 https://launchpad.net/ubuntu/+source/openjdk-7/7u101-2.6.6-0ubuntu0.14.04.1 --rWhLK7VZz0iBluhq Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCgAGBQJXKqnIAAoJEC8Jno0AXoH0DuUP/3isRf2Nu31MIes7txAhc7Wi Q9shbWEg3tZCmrz74r8gu0CAIL+hgQJ6gFELyULahJUbfPFluyagMFWyHXcXJDSm GQ50WkSVPQ+6t72Cy91bZ2SKfgcuDtQW6ewutnnfZwxyeraiXs4nze9n/PC+XkkE YvgyCVlbruBM+8hmMEGG+vOZFWSuucH7ZBQ3qk4a2+IG3J00GEOwuTf2Zo+auOML JxYUPFzHFoOLHmde7l4LJtv221DrjBEUdtj39WaKqUmQFFjnhkP1Yfef4s0y3XKk n193VJtKuwV2y7ljNKeiQ1qhe336iiN27zchw1DnPgDdVDgaDkOgh6MroPOA5xJb B7330FAFuerVugkAyEGk+EY5p4zMeKQzEZ5C8PqEZJhGGgnGeQWZDIoDvcmYx6VT ICNRx2IQ06irERJ70iGfXHLeVou44VFyEGqdDiwNIOMwlV9WL0zJ0rN9fkJNsbO4 9/jy02TSAxku8b3rRNHucIUCCUSAGMs7vhYGD3e+OJ3FTtYm7pmn8/bVL37i/gLz BpK/A/v+wjUVeiu7szivGNqpTWSQfumDoekp1MIxe1wG+97jXq9Edd/h/zVOk6Aw 7w6NMgRgolpFIcks+QdL0JYqsYpi24SctA+ovb2CXMlv3wDlFVeowzk90cImll6A X+y63UAm7EdPlLIh07J0 =ToSl -----END PGP SIGNATURE----- --rWhLK7VZz0iBluhq-- --===============5488690259501966355== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline -- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce --===============5488690259501966355==-- |