USN-3130-1: OpenJDK 7 vulnerabilities
17 November 2016
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 LTS
Several security issues were fixed in OpenJDK 7.
- openjdk-7 - Open Source Java implementation
It was discovered that OpenJDK did not restrict the set of algorithms used for Jar integrity verification. An attacker could use this to modify without detection the content of a JAR file, affecting system integrity. (CVE-2016-5542)
It was discovered that the JMX component of OpenJDK did not sufficiently perform classloader consistency checks. An attacker could use this to bypass Java sandbox restrictions. (CVE-2016-5554)
It was discovered that the Hotspot component of OpenJDK did not properly check received Java Debug Wire Protocol (JDWP) packets. An attacker could use this to send debugging commands to a Java application with debugging enabled. (CVE-2016-5573)
It was discovered that the Hotspot component of OpenJDK did not properly check arguments of the System.arraycopy() function in certain cases. An attacker could use this to bypass Java sandbox restrictions. (CVE-2016-5582)
It was discovered that OpenJDK did not properly handle HTTP proxy authentication. An attacker could use this to expose HTTPS server authentication credentials. (CVE-2016-5597)
The problem can be corrected by updating your system to the following package versions:
- Ubuntu 14.04 LTS
- icedtea-7-jre-jamvm - 7u121-2.6.8-1ubuntu0.14.04.1
- openjdk-7-jre - 7u121-2.6.8-1ubuntu0.14.04.1
- openjdk-7-jre-headless - 7u121-2.6.8-1ubuntu0.14.04.1
- openjdk-7-jre-lib - 7u121-2.6.8-1ubuntu0.14.04.1
- openjdk-7-jre-zero - 7u121-2.6.8-1ubuntu0.14.04.1
To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.
After a standard system update you need to restart any Java applications or applets to make all the necessary changes.