[USN-2884-1] OpenJDK 7 vulnerabilities

Steve Beattie steve.beattie at canonical.com
Mon Feb 1 21:04:24 UTC 2016


==========================================================================
Ubuntu Security Notice USN-2884-1
February 01, 2016

openjdk-7 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 15.10
- Ubuntu 15.04
- Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in OpenJDK 7.

Software Description:
- openjdk-7: Open Source Java implementation

Details:

Multiple vulnerabilities were discovered in the OpenJDK JRE related
to information disclosure, data integrity, and availability. An
attacker could exploit these to cause a denial of service, expose
sensitive data over the network, or possibly execute arbitrary code.
(CVE-2016-0483, CVE-2016-0494)

A vulnerability was discovered in the OpenJDK JRE related to data
integrity. An attacker could exploit this to expose sensitive data
over the network or possibly execute arbitrary code. (CVE-2016-0402)

It was discovered that OpenJDK 7 incorrectly allowed MD5 to be used
for TLS connections. If a remote attacker were able to perform a
man-in-the-middle attack, this flaw could be exploited to expose
sensitive information. (CVE-2015-7575)

A vulnerability was discovered in the OpenJDK JRE related to
information disclosure. An attacker could exploit this to expose
sensitive data over the network. (CVE-2016-0448)

A vulnerability was discovered in the OpenJDK JRE related to
availability. An attacker could exploit this to cause a denial of
service. (CVE-2016-0466)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 15.10:
  icedtea-7-jre-jamvm             7u95-2.6.4-0ubuntu0.15.10.1
  openjdk-7-jre                   7u95-2.6.4-0ubuntu0.15.10.1
  openjdk-7-jre-headless          7u95-2.6.4-0ubuntu0.15.10.1
  openjdk-7-jre-lib               7u95-2.6.4-0ubuntu0.15.10.1
  openjdk-7-jre-zero              7u95-2.6.4-0ubuntu0.15.10.1

Ubuntu 15.04:
  icedtea-7-jre-jamvm             7u95-2.6.4-0ubuntu0.15.04.1
  openjdk-7-jre                   7u95-2.6.4-0ubuntu0.15.04.1
  openjdk-7-jre-headless          7u95-2.6.4-0ubuntu0.15.04.1
  openjdk-7-jre-lib               7u95-2.6.4-0ubuntu0.15.04.1
  openjdk-7-jre-zero              7u95-2.6.4-0ubuntu0.15.04.1

Ubuntu 14.04 LTS:
  icedtea-7-jre-jamvm             7u95-2.6.4-0ubuntu0.14.04.1
  openjdk-7-jre                   7u95-2.6.4-0ubuntu0.14.04.1
  openjdk-7-jre-headless          7u95-2.6.4-0ubuntu0.14.04.1
  openjdk-7-jre-lib               7u95-2.6.4-0ubuntu0.14.04.1
  openjdk-7-jre-zero              7u95-2.6.4-0ubuntu0.14.04.1

This update uses a new upstream release, which includes additional
bug fixes. After a standard system update you need to restart any
Java applications or applets to make all the necessary changes.

References:
  http://www.ubuntu.com/usn/usn-2884-1
  CVE-2015-7575, CVE-2016-0402, CVE-2016-0448, CVE-2016-0466,
  CVE-2016-0483, CVE-2016-0494

Package Information:
  https://launchpad.net/ubuntu/+source/openjdk-7/7u95-2.6.4-0ubuntu0.15.10.1
  https://launchpad.net/ubuntu/+source/openjdk-7/7u95-2.6.4-0ubuntu0.15.04.1
  https://launchpad.net/ubuntu/+source/openjdk-7/7u95-2.6.4-0ubuntu0.14.04.1

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: Digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20160201/7e8c87f7/attachment.sig>


More information about the ubuntu-security-announce mailing list