==========================================================================
Ubuntu Security Notice USN-3062-1
August 16, 2016
openjdk-7 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 14.04 LTS
Summary:
Several security issues were fixed in OpenJDK 7.
Software Description:
– openjdk-7: Open Source Java implementation
Details:
Multiple vulnerabilities were discovered in the OpenJDK JRE related to
information disclosure, data integrity, and availability. An attacker
could exploit these to cause a denial of service, expose sensitive data
over the network, or possibly execute arbitrary code. (CVE-2016-3598,
CVE-2016-3606, CVE-2016-3610)
A vulnerability was discovered in the OpenJDK JRE related to data
integrity. An attacker could exploit this to expose sensitive data
over the network or possibly execute arbitrary code. (CVE-2016-3458)
Multiple vulnerabilities were discovered in the OpenJDK JRE related
to availability. An attacker could exploit these to cause a denial
of service. (CVE-2016-3500, CVE-2016-3508)
A vulnerability was discovered in the OpenJDK JRE related to information
disclosure. An attacker could exploit this to expose sensitive data over
the network. (CVE-2016-3550)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 LTS:
icedtea-7-jre-jamvm 7u111-2.6.7-0ubuntu0.14.04.3
openjdk-7-jre 7u111-2.6.7-0ubuntu0.14.04.3
openjdk-7-jre-headless 7u111-2.6.7-0ubuntu0.14.04.3
openjdk-7-jre-lib 7u111-2.6.7-0ubuntu0.14.04.3
openjdk-7-jre-zero 7u111-2.6.7-0ubuntu0.14.04.3
After a standard system update you need to restart any Java
applications or applets to make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-3062-1
CVE-2016-3458, CVE-2016-3500, CVE-2016-3508, CVE-2016-3550,
CVE-2016-3598, CVE-2016-3606, CVE-2016-3610
Package Information:
https://launchpad.net/ubuntu/+source/openjdk-7/7u111-2.6.7-0ubuntu0.14.04.3
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1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=oZOo
—–END PGP SIGNATURE—–
—