Jump to content
net3design

OpenJDK 7 vulnerabilities

Recommended Posts

ubuntu-logo-348x196.jpg

Ubuntu Security Notice USN-2089-1

A security issue affects these releases of Ubuntu and its derivatives:

Ubuntu 13.10

Ubuntu 13.04

Ubuntu 12.10

Summary

Several security issues were fixed in OpenJDK 7.

Software description

openjdk-7 - Open Source Java implementation

Details

Several vulnerabilities were discovered in the OpenJDK JRE related to

information disclosure and data integrity. An attacker could exploit these

to expose sensitive data over the network. (CVE-2013-3829, CVE-2013-5783,

CVE-2013-5804, CVE-2014-0411)

Several vulnerabilities were discovered in the OpenJDK JRE related to

availability. An attacker could exploit these to cause a denial of service.

(CVE-2013-4002, CVE-2013-5803, CVE-2013-5823, CVE-2013-5825, CVE-2013-5896,

CVE-2013-5910)

Several vulnerabilities were discovered in the OpenJDK JRE related to data

integrity. (CVE-2013-5772, CVE-2013-5774, CVE-2013-5784, CVE-2013-5797,

CVE-2013-5820, CVE-2014-0376, CVE-2014-0416)

Several vulnerabilities were discovered in the OpenJDK JRE related to

information disclosure. An attacker could exploit these to expose sensitive

data over the network. (CVE-2013-5778, CVE-2013-5780, CVE-2013-5790,

CVE-2013-5800, CVE-2013-5840, CVE-2013-5849, CVE-2013-5851, CVE-2013-5884,

CVE-2014-0368)

Several vulnerabilities were discovered in the OpenJDK JRE related to

information disclosure, data integrity and availability. An attacker could

exploit these to cause a denial of service or expose sensitive data over

the network. (CVE-2013-5782, CVE-2013-5802, CVE-2013-5809, CVE-2013-5829,

CVE-2013-5814, CVE-2013-5817, CVE-2013-5830, CVE-2013-5842, CVE-2013-5850,

CVE-2013-5878, CVE-2013-5893, CVE-2013-5907, CVE-2014-0373, CVE-2014-0408,

CVE-2014-0422, CVE-2014-0428)

A vulnerability was discovered in the OpenJDK JRE related to information

disclosure and availability. An attacker could exploit this to expose

sensitive data over the network or cause a denial of service.

(CVE-2014-0423)

Update instructions

The problem can be corrected by updating your system to the following package version:

Ubuntu 13.10:

openjdk-7-jre-lib 7u51-2.4.4-0ubuntu0.13.10.1

openjdk-7-jre-zero 7u51-2.4.4-0ubuntu0.13.10.1

icedtea-7-jre-jamvm 7u51-2.4.4-0ubuntu0.13.10.1

openjdk-7-jre-headless 7u51-2.4.4-0ubuntu0.13.10.1

openjdk-7-jre 7u51-2.4.4-0ubuntu0.13.10.1

Ubuntu 13.04:

openjdk-7-jre-lib 7u51-2.4.4-0ubuntu0.13.04.2

openjdk-7-jre-zero 7u51-2.4.4-0ubuntu0.13.04.2

icedtea-7-jre-jamvm 7u51-2.4.4-0ubuntu0.13.04.2

openjdk-7-jre-headless 7u51-2.4.4-0ubuntu0.13.04.2

openjdk-7-jre 7u51-2.4.4-0ubuntu0.13.04.2

Ubuntu 12.10:

openjdk-7-jre-zero 7u51-2.4.4-0ubuntu0.12.10.2

icedtea-7-jre-jamvm 7u51-2.4.4-0ubuntu0.12.10.2

icedtea-7-jre-cacao 7u51-2.4.4-0ubuntu0.12.10.2

openjdk-7-jre-lib 7u51-2.4.4-0ubuntu0.12.10.2

openjdk-7-jre-headless 7u51-2.4.4-0ubuntu0.12.10.2

openjdk-7-jre 7u51-2.4.4-0ubuntu0.12.10.2

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

This update uses a new upstream release, which includes additional bug

fixes. After a standard system update you need to restart any Java

applications or applets to make all the necessary changes.

References

CVE-2013-3829, CVE-2013-4002, CVE-2013-5772, CVE-2013-5774, CVE-2013-5778, CVE-2013-5780, CVE-2013-5782, CVE-2013-5783, CVE-2013-5784, CVE-2013-5790, CVE-2013-5797, CVE-2013-5800, CVE-2013-5802, CVE-2013-5803, CVE-2013-5804, CVE-2013-5805, CVE-2013-5806, CVE-2013-5809, CVE-2013-5814, CVE-2013-5817, CVE-2013-5820, CVE-2013-5823, CVE-2013-5825, CVE-2013-5829, CVE-2013-5830, CVE-2013-5840, CVE-2013-5842, CVE-2013-5849, CVE-2013-5850, CVE-2013-5851, CVE-2013-5878, CVE-2013-5884, CVE-2013-5893, CVE-2013-5896, CVE-2013-5907, CVE-2013-5910, CVE-2014-0368, CVE-2014-0373, CVE-2014-0376, CVE-2014-0408, CVE-2014-0411, CVE-2014-0416, CVE-2014-0422, CVE-2014-0423, CVE-2014-0428

Source : Ubuntu Blog

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...