U radu programskog paketa java-1.6.0-openjdk uočene su i ispravljene višestruke sigurnosne nepravilnosti koje potencijalni napadači mogu iskoristiti za izvršavanje proizvoljnog programskog koda, otkrivanje i izmjenu pojedinih podataka, te za izvođenje napada uskraćivanjem usluge.
Paket: | java-1.6.0-openjdk |
Operacijski sustavi: | Fedora 14, Fedora 15 |
Kritičnost: | 7.4 |
Problem: | pogreška u programskoj komponenti |
Iskorištavanje: | udaljeno |
Posljedica: | izmjena podataka, otkrivanje osjetljivih informacija, proizvoljno izvršavanje programskog koda, uskraćivanje usluga (DoS) |
Rješenje: | programska zakrpa proizvođača |
CVE: | CVE-2011-3547, CVE-2011-3548, CVE-2011-3551, CVE-2011-3552, CVE-2011-3544, CVE-2011-3521, CVE-2011-3554, CVE-2011-3389, CVE-2011-3558, CVE-2011-3556, CVE-2011-3557, CVE-2011-3560, CVE-2011-2513, CVE-2011-0872, CVE-2011-0865, CVE-2011-0815, CVE-2011-0822 |
Izvorni ID preporuke: | FEDORA-2011-14638 |
Izvor: | Fedora |
Problem: | |
Neki od propusta se javljaju zbog nepravilnosti u implementaciji Secure Sockets Layer 3.0 (SSL) i Transport Layer Security 1.0 (TLS) protokola. Preostali su uzrokovani pogreškama u komponentama Scripting, Sound, Deployment, AWT, Swing, JSSE i JRE. Za više detalja preporuča se pregled izvorne preporuke. |
|
Posljedica: | |
Napadači mogu iskoristiti spomenute ranjivosti za izvršavanje proizvoljnog programskog koda, otkrivanje i izmjenu podataka, i izvođenje DoS napada. |
|
Rješenje: | |
Savjetuje se nadogradnja paketa na noviju inačicu. |
Izvorni tekst preporuke
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2011-14638
2011-10-20 09:34:15
--------------------------------------------------------------------------------
Name : java-1.6.0-openjdk
Product : Fedora 14
Version : 1.6.0.0
Release : 55.1.9.10.fc14
URL : http://icedtea.classpath.org/
Summary : OpenJDK Runtime Environment
Description :
The OpenJDK runtime environment.
--------------------------------------------------------------------------------
Update Information:
http://blog.fuseyism.com/index.php/2011/10/18/security-icedtea6-1-8-10-1-9-10-and-1-10-4-released/
--------------------------------------------------------------------------------
ChangeLog:
* Thu Oct 13 2011 Jiri Vanek <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1:1.6.0.01:1.6.0.0-55.1.9.10
Security fixes
- S7000600, CVE-2011-3547: InputStream skip() information leak
- S7019773, CVE-2011-3548: mutable static AWTKeyStroke.ctor
- S7023640, CVE-2011-3551: Java2D TransformHelper integer overflow
- S7032417, CVE-2011-3552: excessive default UDP socket limit under
SecurityManager
- S7046823, CVE-2011-3544: missing SecurityManager checks in scripting engine
- S7055902, CVE-2011-3521: IIOP deserialization code execution
- S7057857, CVE-2011-3554: insufficient pack200 JAR files uncompress error
checks
- S7064341, CVE-2011-3389: JSSE
- S7070134, CVE-2011-3558: Hotspot unspecified issue
- S7077466, CVE-2011-3556: RMI DGC server remote code execution
- S7083012, CVE-2011-3557: RMI registry privileged code execution
- S7096936, CVE-2011-3560: missing checkSetFactory calls in
HttpsURLConnection
NetX
- PR794: javaws does not work if a Web Start app jar has a Class-Path element
in the manifest
* Wed Jul 20 2011 Jiri Vanek <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1:1.6.0.01:1.6.0.0-54.1.9.8
- PR744: icedtea6-1.10.2 : patching error
- PR748: Icedtea6 fails to build with Linux 3.0.
- RH718164, CVE-2011-2513: Home directory path disclosure to untrusted
applications
* Fri Jun 10 2011 Jiri Vanek <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1:1.6.0.0-53.1.9.8
- added requires: fontconfig
- resolves: rhbz#708201
* Mon Jun 6 2011 Jiri Vanek <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1:1.6.0.0-53.1.9.8
- Resolves: rhbz#709375
- Bumped to IcedTea6 1.9.8
- RH706250, S6213702, CVE-2011-0872: (so) non-blocking sockets with TCP urgent
disabled get still selected for read ops (win)
- RH706106, S6618658, CVE-2011-0865: Vulnerability in deserialization
- RH706111, S7012520, CVE-2011-0815: Heap overflow vulnerability in
FileDialog.show() (win)
- RH706139, S7013519, CVE-2011-0822, CVE-2011-0862: Integer overflows in 2D
code
- RH706153, S7013969, CVE-2011-0867: NetworkInterface.toString can reveal
bindings
- RH706234, S7013971, CVE-2011-0869: Vulnerability in SAAJ
- RH706239, S7016340, CVE-2011-0870: Vulnerability in SAAJ
- RH706241, S7016495, CVE-2011-0868: Crash in Java 2D transforming an image
with scale close to zero
- RH706248, S7020198, CVE-2011-0871: ImageIcon creates Component with null acc
- RH706245, S7020373, CVE-2011-0864: JSR rewriting can overflow memory address
size variables
* Tue Feb 15 2011 Deepak Bhole <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1:1.6.0.0-52.1.9.7
- Updated to IcedTea6 1.9.8
- Enabled bootstrap
- Security updates:
S6378709, CVE-2010-4465: AWT event dispatch does not support framework code
S6854912, CVE-2010-4465: Security issue with the clipboard access in Applets
S6878713, CVE-2010-4469: Verifier heap corruption, relating to backward jsrs
S6907662, CVE-2010-4465: System clipboard should ensure access restrictions
S6927050, CVE-2010-4470: Features set on SchemaFactory not inherited by
Validator
S6981922, CVE-2010-4448: DNS cache poisoning by untrusted applets
S6983554, CVE-2010-4450: (launcher) Fix empty user's LD_LIBRARY_PATH
environment variable in the launcher
S6985453, CVE-2010-4471: Font.createFont may expose some system properties
in exception text
S6994263, CVE-2010-4472: Untrusted code can replace JRE's XML DSig Transform
or C14N algorithm implementations
RH677332, CVE-2011-0706: IcedTea multiple signers privilege escalation
* Wed Feb 9 2011 Jiri Vanek <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1:1.6.0.0-52.1.9.6
- updated to icedtea 1.9.6
- Security updates
- S4421494, CVE-2010-4476: infinite loop while parsing double literal.
* Fri Jan 28 2011 Jiri Vanek <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1:1.6.0.0-51.1.9.5
- updated to icedtea 1.9.5
- Resolves: rhbz#672262
- Security updates
- RH672262, CVE-2011-0025: IcedTea jarfile signature verification bypass
- Backports
- S6687968: PNGImageReader leaks native memory through an Inflater
- S6541476, RH665355: PNG imageio plugin incorrectly handles iTXt chunk
- S6782079: PNG: reading metadata may cause OOM on truncated images
- Fixes
- RH647157, RH582455: Update fontconfig files for rhel 6
- PR619: Improper finalization by the plugin can crash the browser
* Wed Jan 5 2011 Jiri Vanek <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1:1.6.0.0-50.1.9.4
- Updated to IcedTea 1.9.4
* Wed Dec 1 2010 Deepak Bhole <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1:1.6.0.0-49.1.9.3
- Updated to IcedTea 1.9.3
- Re-enable Compressed Oops by default as upstream bug# 7002666 is fixed
* Tue Nov 30 2010 Deepak Bhole <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1:1.6.0.0-49.1.9.2
- Update to IcedTea 1.9.2
- Resolves: rhbz# 645843
- Resolves: rhbz# 647737
- Resolves: rhbz# 643674
- Remove patch that disabled Compressed Oops. It is now the default upstream.
* Mon Nov 29 2010 Jiri Vanek <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> -1:1.6.0-48.1.9.1
- Resolves: rhbz#657491
- Removed Asian and Indic font dependencies.
* Mon Nov 22 2010 Jiri Vanek <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> -1:1.6.0-47.1.9.1
- added fonts dependencies
* Mon Nov 8 2010 Deepak Bhole <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1:1.6.0.0-46.1.9.1
- Temporarily resolve rhbz#647737:
- Put hs19 back, but disable Compressed Oops
* Mon Nov 8 2010 Deepak Bhole <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1:1.6.0.0-45.1.9.1
- Temporarily resolve rhbz#647737:
- Build with default hotspot (hs17)
- From Jiri Vanek (Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.):
-Fixing rhbz#648499 - BuildRequires: redhat-lsb
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update java-1.6.0-openjdk' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
https://admin.fedoraproject.org/mailman/listinfo/package-announce
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2011-14648
2011-10-20 09:34:43
--------------------------------------------------------------------------------
Name : java-1.6.0-openjdk
Product : Fedora 15
Version : 1.6.0.0
Release : 60.1.10.4.fc15
URL : http://icedtea.classpath.org/
Summary : OpenJDK Runtime Environment
Description :
The OpenJDK runtime environment.
--------------------------------------------------------------------------------
Update Information:
http://blog.fuseyism.com/index.php/2011/10/18/security-icedtea6-1-8-10-1-9-10-and-1-10-4-released/
--------------------------------------------------------------------------------
ChangeLog:
* Thu Oct 13 2011 Jiri Vanek <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1:1.6.0.0-60.1.10.4
- updated to icedtea6 1.10.4
- Security fixes
- S7000600, CVE-2011-3547: InputStream skip() information leak
- S7019773, CVE-2011-3548: mutable static AWTKeyStroke.ctor
- S7023640, CVE-2011-3551: Java2D TransformHelper integer overflow
- S7032417, CVE-2011-3552: excessive default UDP socket limit under
SecurityManager
- S7046823, CVE-2011-3544: missing SecurityManager checks in scripting engine
- S7055902, CVE-2011-3521: IIOP deserialization code execution
- S7057857, CVE-2011-3554: insufficient pack200 JAR files uncompress error
checks
- S7064341, CVE-2011-3389: HTTPS: block-wise chosen-plaintext attack against
SSL/TLS (BEAST)
- S7070134, CVE-2011-3558: HotSpot crashes with sigsegv from PorterStemmer
- S7077466, CVE-2011-3556: RMI DGC server remote code execution
- S7083012, CVE-2011-3557: RMI registry privileged code execution
- S7096936, CVE-2011-3560: missing checkSetFactory calls in
HttpsURLConnection
- Bug fixes
- RH727195 : Japanese font mappings are broken
- Backports
- S6826104, RH730015: Getting a NullPointer exception when clicked on
Application & Toolkit Modal dialog
- Zero/Shark
- PR690: Shark fails to JIT using hs20.
- PR696: Zero fails to handle fast_aldc and fast_aldc_w in hs20.
* Fri Jul 22 2011 Jiri Vanek <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1:1.6.0.0-59.1.10.3
- updated to icedtea6 1.10.3
- http://blog.fuseyism.com/index.php/2011/07/21/icedtea6-1103-released/
* Fri Jun 10 2011 Jiri Vanek <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1:1.6.0.0-58.1.10.2
- added requires: fontconfig
- resolves: rhbz#708201
* Mon Jun 6 2011 Jiri Vanek <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1:1.6.0.0-58.1.10.2
- Resolves: rhbz#709375
- Bumped to IcedTea6 1.10.2
- RH706250, S6213702, CVE-2011-0872: (so) non-blocking sockets with TCP urgent
disabled get still selected for read ops (win)
- RH706106, S6618658, CVE-2011-0865: Vulnerability in deserialization
- RH706111, S7012520, CVE-2011-0815: Heap overflow vulnerability in
FileDialog.show() (win)
- RH706139, S7013519, CVE-2011-0822, CVE-2011-0862: Integer overflows in 2D
code
- RH706153, S7013969, CVE-2011-0867: NetworkInterface.toString can reveal
bindings
- RH706234, S7013971, CVE-2011-0869: Vulnerability in SAAJ
- RH706239, S7016340, CVE-2011-0870: Vulnerability in SAAJ
- RH706241, S7016495, CVE-2011-0868: Crash in Java 2D transforming an image
with scale close to zero
- RH706248, S7020198, CVE-2011-0871: ImageIcon creates Component with null acc
- RH706245, S7020373, CVE-2011-0864: JSR rewriting can overflow memory address
size variables
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update java-1.6.0-openjdk' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Posljednje sigurnosne preporuke