==========================================================================
Ubuntu Security Notice USN-3077-1
September 12, 2016
openjdk-6 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 12.04 LTS
Summary:
Several security issues were fixed in OpenJDK 6.
Software Description:
– openjdk-6: Open Source Java implementation
Details:
A vulnerability was discovered in the OpenJDK JRE related to data
integrity. An attacker could exploit this to expose sensitive data over the
network or possibly execute arbitrary code. (CVE-2016-3458)
Multiple vulnerabilities were discovered in the OpenJDK JRE related
to availability. An attacker could exploit these to cause a denial
of service. (CVE-2016-3500, CVE-2016-3508)
A vulnerability was discovered in the OpenJDK JRE related to information
disclosure. An attacker could exploit this to expose sensitive data over
the network. (CVE-2016-3550)
A vulnerability was discovered in the OpenJDK JRE related to information
disclosure, data integrity, and availability. An attacker could exploit
this to cause a denial of service, expose sensitive data over the network,
or possibly execute arbitrary code. (CVE-2016-3606)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.04 LTS:
icedtea-6-jre-cacao 6b40-1.13.12-0ubuntu0.12.04.1
icedtea-6-jre-jamvm 6b40-1.13.12-0ubuntu0.12.04.1
openjdk-6-jre 6b40-1.13.12-0ubuntu0.12.04.1
openjdk-6-jre-headless 6b40-1.13.12-0ubuntu0.12.04.1
openjdk-6-jre-lib 6b40-1.13.12-0ubuntu0.12.04.1
openjdk-6-jre-zero 6b40-1.13.12-0ubuntu0.12.04.1
After a standard system update you need to restart any Java
applications or applets to make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-3077-1
CVE-2016-3458, CVE-2016-3500, CVE-2016-3508, CVE-2016-3550,
CVE-2016-3606
Package Information:
https://launchpad.net/ubuntu/+source/openjdk-6/6b40-1.13.12-0ubuntu0.12.04.1
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1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=5U3P
—–END PGP SIGNATURE—–
—