Multiple vulnerabilities have been found in Oracle's Java SE Development Kit and Runtime Environment, the worst of which could lead to execution of arbitrary code.
Package | dev-java/oracle-jre-bin on all architectures |
---|---|
Affected versions | < 1.7.0.71 |
Unaffected versions | >= 1.7.0.71 |
Package | dev-java/oracle-jdk-bin on all architectures |
---|---|
Affected versions | < 1.7.0.71 |
Unaffected versions | >= 1.7.0.71 |
Package | app-emulation/emul-linux-x86-java on all architectures |
---|---|
Affected versions | < 1.7.0.71 |
Unaffected versions | >= 1.7.0.71 |
Oracle’s Java SE Development Kit and Runtime Environment
Multiple vulnerabilities have been discovered in Oracle’s Java SE Development Kit and Runtime Environment. Please review the CVE identifiers referenced below for details.
A context-dependent attacker may be able to execute arbitrary code, disclose, update, insert, or delete certain data.
There is no known workaround at this time.
All Oracle JRE 1.7 users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=dev-java/oracle-jre-bin-1.7.0.71"
All Oracle JDK 1.7 users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=dev-java/oracle-jdk-bin-1.7.0.71"
All users of the precompiled 32-bit Oracle JRE should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=app-emulation/emul-linux-x86-java-1.7.0.71"