漏洞类别:Ubuntu
漏洞等级:
漏洞信息
It was discovered that the Hotspot component of OpenJDK did not properly check arguments of the System.arraycopy() function in certain cases.
It was discovered that OpenJDK did not restrict the set of algorithms used for Jar integrity verification.
It was discovered that the JMX component of OpenJDK did not sufficiently perform classloader consistency checks.
It was discovered that the Hotspot component of OpenJDK did not properly check received Java Debug Wire Protocol (JDWP) packets.
It was discovered that OpenJDK did not properly handle HTTP proxy authentication.
漏洞危害
An attacker could use this to bypass Java sandbox restrictions. (CVE-2016-5582)
An attacker could use this to modify without detection the content of a JAR file, affecting system integrity. (CVE-2016-5542)
An attacker could use this to bypass Java sandbox restrictions. (CVE-2016-5554)
An attacker could use this to send debugging commands to a Java application with debugging enabled. (CVE-2016-5573)
An attacker could use this to expose HTTPS server authentication credentials. (CVE-2016-5597)
解决方案
Refer to Ubuntu advisory USN-3121-1 for affected packages and patching details, or update with your package manager.
Patch:
Following are links for downloading patches to fix the vulnerabilities:
USN-3121-1: 16.10 (Yakkety) on src (openjdk-8-jre)
USN-3121-1: 16.10 (Yakkety) on src (openjdk-8-jre-zero)
USN-3121-1: 16.10 (Yakkety) on src (openjdk-8-jre-jamvm)
USN-3121-1: 16.04 (Xenial) on src (openjdk-8-jre-jamvm)
USN-3121-1: 16.04 (Xenial) on src (openjdk-8-jre-zero)
USN-3121-1: 16.04 (Xenial) on src (openjdk-8-jdk)
USN-3121-1: 16.10 (Yakkety) on src (openjdk-8-jdk-headless)
USN-3121-1: 16.10 (Yakkety) on src (openjdk-8-jdk)
USN-3121-1: 16.04 (Xenial) on src (openjdk-8-jre)
USN-3121-1: 16.04 (Xenial) on src (openjdk-8-jdk-headless)
0day
文章评论