Critical security flaws found in java-1.7.0-openjdk, allowing bypass of sandbox restrictions and execution of arbitrary code. SSL 3.0 disabled due to vulnerability. Update to fix
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
![]() | java-1.7.0-openjdk security update | 21 Jan 201500:00 | – | oraclelinux |
![]() | java-1.7.0-openjdk security update | 21 Jan 201500:00 | – | oraclelinux |
![]() | java-1.6.0-openjdk security update | 26 Jan 201500:00 | – | oraclelinux |
![]() | java-1.8.0-openjdk security update | 21 Jan 201500:00 | – | oraclelinux |
![]() | (RHSA-2015:0067) Critical: java-1.7.0-openjdk security update | 21 Jan 201500:00 | – | redhat |
![]() | (RHSA-2015:0068) Important: java-1.7.0-openjdk security update | 20 Jan 201500:00 | – | redhat |
![]() | (RHSA-2015:0085) Important: java-1.6.0-openjdk security update | 26 Jan 201500:00 | – | redhat |
![]() | (RHSA-2015:0069) Important: java-1.8.0-openjdk security update | 21 Jan 201521:36 | – | redhat |
![]() | (RHSA-2015:0086) Important: java-1.6.0-sun security update | 26 Jan 201517:11 | – | redhat |
![]() | (RHSA-2015:0079) Critical: java-1.7.0-oracle security update | 22 Jan 201521:17 | – | redhat |
Source | Link |
---|---|
rhn | www.rhn.redhat.com/errata/RHSA-2015-0067.html |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
Amazon Linux | 1 | i686 | java-1.7.0-openjdk-debuginfo | 1.7.0.75-2.5.4.0.53.amzn1 | java-1.7.0-openjdk-debuginfo-1.7.0.75-2.5.4.0.53.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | java-1.7.0-openjdk | 1.7.0.75-2.5.4.0.53.amzn1 | java-1.7.0-openjdk-1.7.0.75-2.5.4.0.53.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | java-1.7.0-openjdk-demo | 1.7.0.75-2.5.4.0.53.amzn1 | java-1.7.0-openjdk-demo-1.7.0.75-2.5.4.0.53.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | java-1.7.0-openjdk-src | 1.7.0.75-2.5.4.0.53.amzn1 | java-1.7.0-openjdk-src-1.7.0.75-2.5.4.0.53.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | java-1.7.0-openjdk-devel | 1.7.0.75-2.5.4.0.53.amzn1 | java-1.7.0-openjdk-devel-1.7.0.75-2.5.4.0.53.amzn1.i686.rpm |
Amazon Linux | 1 | noarch | java-1.7.0-openjdk-javadoc | 1.7.0.75-2.5.4.0.53.amzn1 | java-1.7.0-openjdk-javadoc-1.7.0.75-2.5.4.0.53.amzn1.noarch.rpm |
Amazon Linux | 1 | x86_64 | java-1.7.0-openjdk-devel | 1.7.0.75-2.5.4.0.53.amzn1 | java-1.7.0-openjdk-devel-1.7.0.75-2.5.4.0.53.amzn1.x86_64.rpm |
Amazon Linux | 1 | x86_64 | java-1.7.0-openjdk | 1.7.0.75-2.5.4.0.53.amzn1 | java-1.7.0-openjdk-1.7.0.75-2.5.4.0.53.amzn1.x86_64.rpm |
Amazon Linux | 1 | x86_64 | java-1.7.0-openjdk-src | 1.7.0.75-2.5.4.0.53.amzn1 | java-1.7.0-openjdk-src-1.7.0.75-2.5.4.0.53.amzn1.x86_64.rpm |
Amazon Linux | 1 | x86_64 | java-1.7.0-openjdk-debuginfo | 1.7.0.75-2.5.4.0.53.amzn1 | java-1.7.0-openjdk-debuginfo-1.7.0.75-2.5.4.0.53.amzn1.x86_64.rpm |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo