1.5.11 needs oracle-8. here is a good page how to switch over easily.
https://www.digitalocean.com/community/tutorials/how-to-install-java-on-ubuntu-with-apt-get
If I'm not mistaken, the Oracle JDK is not open source and there are no ARM binaries available. How are people supposed to run NRS on the many (many!) available ARM devices such as the Raspberry Pi?
add-apt-repository ppa:webupd8team/java
apt-get update
apt-get install oracle-java8-installer
or
http://www.oracle.com/technetwork/java/javase/downloads/jdk8-arm-downloads-2187472.html
The latest available there is 8u33 which has 13 security vulnerabilities currently (3 of them rated 10/10 for severity):
http://www.cvedetails.com/vulnerability-list/vendor_id-93/product_id-19116/Oracle-JDK.html
So everyone running the latest NRS on an ARM device (Raspberry Pi, etc) is likely open to several severe security vulnerabilities. ARM users should be instructed to shut down their nodes until Oracle releases something newer than 8u40. NRS updates should have been delayed until a secure ARM binary is available from Oracle. This was not handled responsibly from a security standpoint.
can't remember when jdk ever was bug free (like many other complex dev-stacks).
however, since i am not a java coder but running an arm node, it would be helpfull
if you could point me to a more concret security problem or better to a non theoretical
attack vector, where running the arm node isn't secure.
if this is a real world security problem it has to be adressed ofc.
As you know, bugs aren't the issue, security vulnerabilities are, and it looks like 8u41 and higher are free of known security vulnerabilities. The latest version for x86 looks to be 8u45. Details on the vulnerabilities are accessible via this link:
http://www.cvedetails.com/vulnerability-list/vendor_id-93/product_id-19116/Oracle-JDK.html
Instead of giving random links with hundreds of vulnerabilities, can you post an exact vulnerability, explain how it works, and how is it relevant to Nxt? A lot of these vulnerabilities are related to applets where you are running UNTRUSTED code found on a random webpage. Nxt doesn't use applets. And Nxt isn't UNTRUSTED code as you download it from official source (Nxt developers who you presumably trust) Understand that difference and then you will see none of these 'vulnerabilities" have any relevance in your usecase.