USN-2818-1: OpenJDK 7 vulnerability
25 November 2015
A security issue was fixed in OpenJDK 7.
Releases
Packages
- openjdk-7 - Open Source Java implementation
Details
It was discovered that rebinding of the receiver of a
DirectMethodHandle may allow a protected method to be accessed. Am
attacker could use this to expose sensitive information or possibly
execute arbitrary code.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 15.10
-
icedtea-7-jre-jamvm
-
7u91-2.6.3-0ubuntu0.15.10.1
-
openjdk-7-jre
-
7u91-2.6.3-0ubuntu0.15.10.1
-
openjdk-7-jre-headless
-
7u91-2.6.3-0ubuntu0.15.10.1
-
openjdk-7-jre-lib
-
7u91-2.6.3-0ubuntu0.15.10.1
-
openjdk-7-jre-zero
-
7u91-2.6.3-0ubuntu0.15.10.1
Ubuntu 15.04
-
icedtea-7-jre-jamvm
-
7u91-2.6.3-0ubuntu0.15.04.1
-
openjdk-7-jre
-
7u91-2.6.3-0ubuntu0.15.04.1
-
openjdk-7-jre-headless
-
7u91-2.6.3-0ubuntu0.15.04.1
-
openjdk-7-jre-lib
-
7u91-2.6.3-0ubuntu0.15.04.1
-
openjdk-7-jre-zero
-
7u91-2.6.3-0ubuntu0.15.04.1
Ubuntu 14.04
-
icedtea-7-jre-jamvm
-
7u91-2.6.3-0ubuntu0.14.04.1
-
openjdk-7-jre
-
7u91-2.6.3-0ubuntu0.14.04.1
-
openjdk-7-jre-headless
-
7u91-2.6.3-0ubuntu0.14.04.1
-
openjdk-7-jre-lib
-
7u91-2.6.3-0ubuntu0.14.04.1
-
openjdk-7-jre-zero
-
7u91-2.6.3-0ubuntu0.14.04.1
After a standard system update you need to restart any Java
applications or applets to make all the necessary changes.