==========================================================================
Ubuntu Security Notice USN-2964-1
May 05, 2016
openjdk-7 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 15.10
– Ubuntu 14.04 LTS
Summary:
Several security issues were fixed in OpenJDK 7.
Software Description:
– openjdk-7: Open Source Java implementation
Details:
Multiple vulnerabilities were discovered in the OpenJDK JRE related to information
disclosure, data integrity, and availability. An attacker could exploit
these to cause a denial of service, expose sensitive data over the network,
or possibly execute arbitrary code. (CVE-2016-0686, CVE-2016-0687,
CVE-2016-3427)
A vulnerability was discovered in the OpenJDK JRE related to information
disclosure. An attacker could exploit this to expose sensitive data over
the network. (CVE-2016-0695)
A vulnerability was discovered in the OpenJDK JRE related to availability.
An attacker could exploit this to cause a denial of service.
(CVE-2016-3425)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 15.10:
icedtea-7-jre-jamvm 7u101-2.6.6-0ubuntu0.15.10.1
openjdk-7-jdk 7u101-2.6.6-0ubuntu0.15.10.1
openjdk-7-jre 7u101-2.6.6-0ubuntu0.15.10.1
openjdk-7-jre-headless 7u101-2.6.6-0ubuntu0.15.10.1
openjdk-7-jre-lib 7u101-2.6.6-0ubuntu0.15.10.1
openjdk-7-jre-zero 7u101-2.6.6-0ubuntu0.15.10.1
openjdk-7-source 7u101-2.6.6-0ubuntu0.15.10.1
Ubuntu 14.04 LTS:
icedtea-7-jre-jamvm 7u101-2.6.6-0ubuntu0.14.04.1
openjdk-7-jdk 7u101-2.6.6-0ubuntu0.14.04.1
openjdk-7-jre 7u101-2.6.6-0ubuntu0.14.04.1
openjdk-7-jre-headless 7u101-2.6.6-0ubuntu0.14.04.1
openjdk-7-jre-lib 7u101-2.6.6-0ubuntu0.14.04.1
openjdk-7-jre-zero 7u101-2.6.6-0ubuntu0.14.04.1
openjdk-7-source 7u101-2.6.6-0ubuntu0.14.04.1
This update uses a new upstream release, which includes additional
bug fixes. After a standard system update you need to restart any
Java applications or applets to make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2964-1
CVE-2016-0686, CVE-2016-0687, CVE-2016-0695, CVE-2016-3425,
CVE-2016-3427
Package Information:
https://launchpad.net/ubuntu/+source/openjdk-7/7u101-2.6.6-0ubuntu0.15.10.1
https://launchpad.net/ubuntu/+source/openjdk-7/7u101-2.6.6-0ubuntu0.14.04.1
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
iQIcBAEBCgAGBQJXKqnIAAoJEC8Jno0AXoH0DuUP/3isRf2Nu31MIes7txAhc7Wi
Q9shbWEg3tZCmrz74r8gu0CAIL+hgQJ6gFELyULahJUbfPFluyagMFWyHXcXJDSm
GQ50WkSVPQ+6t72Cy91bZ2SKfgcuDtQW6ewutnnfZwxyeraiXs4nze9n/PC+XkkE
YvgyCVlbruBM+8hmMEGG+vOZFWSuucH7ZBQ3qk4a2+IG3J00GEOwuTf2Zo+auOML
JxYUPFzHFoOLHmde7l4LJtv221DrjBEUdtj39WaKqUmQFFjnhkP1Yfef4s0y3XKk
n193VJtKuwV2y7ljNKeiQ1qhe336iiN27zchw1DnPgDdVDgaDkOgh6MroPOA5xJb
B7330FAFuerVugkAyEGk+EY5p4zMeKQzEZ5C8PqEZJhGGgnGeQWZDIoDvcmYx6VT
ICNRx2IQ06irERJ70iGfXHLeVou44VFyEGqdDiwNIOMwlV9WL0zJ0rN9fkJNsbO4
9/jy02TSAxku8b3rRNHucIUCCUSAGMs7vhYGD3e+OJ3FTtYm7pmn8/bVL37i/gLz
BpK/A/v+wjUVeiu7szivGNqpTWSQfumDoekp1MIxe1wG+97jXq9Edd/h/zVOk6Aw
7w6NMgRgolpFIcks+QdL0JYqsYpi24SctA+ovb2CXMlv3wDlFVeowzk90cImll6A
X+y63UAm7EdPlLIh07J0
=ToSl
—–END PGP SIGNATURE—–
—