Errata ID | 378 |
---|---|
Date | 2015-11-19 |
Source package | openjdk-6 |
Fixed in version | 6b36-1.13.8-1.78.201510261342 |
Description | Multiple vulnerabilities have been discovered in the implementation of the Java platform. In Univention Corporate Server OpenJDK is used instead of Oracle Java. This erratum updates OpenJDK to the release based on the Oracle update 6u95 which fixes these issues: * deserialization issue in ObjectInputStream.readSerialData() (CVE-2015-2590) * non-constant time comparisons in crypto code (CVE-2015-2601) * NSS/JCE: missing EC parameter validation in ECDH_Derive() (CVE-2015-2613) * unspecified vulnerability in the 2D component (CVE-2015-2619) * incorrect code permission checks in RMIConnectionImpl (CVE-2015-2621) * name for reverse DNS lookup used in certificate identity check (CVE-2015-2625) * IIOPInputStream type confusion vulnerability (CVE-2015-2628) * ICU: integer overflow in LETableReference verifyLength() (CVE-2015-2632) * unspecified vulnerability in the 2D component (CVE-2015-2637) * unspecified vulnerability in the 2D component (CVE-2015-2638) * SSL/TLS: "Invariance Weakness" vulnerability in RC4 stream cipher (CVE-2015-2808) * LOGJAM: TLS connections which support export grade DHE key-exchange are vulnerable to MITM attacks (CVE-2015-4000) * improper permission checks in MBeanServerInvocationHandler (CVE-2015-4731) * insufficient context checks during object deserialization (CVE-2015-4732) * RemoteObjectInvocationHandler allows calling finalize() (CVE-2015-4733) * incorrect OCSP nextUpdate checking (CVE-2015-4748) * DnsClient fails to release request information after error (CVE-2015-4749) * ICU: missing boundary checks in layout engine (CVE-2015-4760) |
Additional notes | |
CVE ID | CVE-2015-2590 CVE-2015-2601 CVE-2015-2613 CVE-2015-2619 CVE-2015-2621 CVE-2015-2625 CVE-2015-2628 CVE-2015-2632 CVE-2015-2637 CVE-2015-2638 CVE-2015-2808 CVE-2015-4000 CVE-2015-4731 CVE-2015-4732 CVE-2015-4733 CVE-2015-4748 CVE-2015-4749 CVE-2015-4760 |
UCS Bug number | #38929 |