U radu programskog paketa java-1.7.0-openjdk uočeno je više sigurnosnih propusta. Udaljeni napadač ih može iskoristiti za utjecaj na dostupnost, pouzdanost i integritet podataka.
Paket:
java-1.7.0-openjdk
Operacijski sustavi:
Fedora 16
Kritičnost:
8.7
Problem:
nespecificirana pogreška, pogreška u programskoj komponenti
Sigurnosni propusti su posljedica višestrukih nespecificiranih pogrešaka te pogrešaka u implementaciji SSL protokola.
Posljedica:
Udaljeni napadač navedene ranjivosti može iskoristiti za dobivanje većih privilegija, zaobilaženje ograničenja te otkrivanje i izmjenu osjetljivih podataka.
Rješenje:
Svim se korisnicima navedenog programskog paketa savjetuje njegova nadogradnja na novije inačice.
---------------------------------------------------------------------------=
-----
Fedora Update Notification
FEDORA-2011-15555
2011-11-07 08:18:30
---------------------------------------------------------------------------=
-----
Name : java-1.7.0-openjdk
Product : Fedora 16
Version : 1.7.0.1
Release : 2.0.2.fc16
URL : http://openjdk.java.net/
Summary : OpenJDK Runtime Environment
Description :
The OpenJDK runtime environment.
---------------------------------------------------------------------------=
-----
Update Information:
This update brings OpenJDK7 u1 to Fedora. The following issues have been ad=
dressed:
- Updated to IcedTea 2.0 tag in the IcedTea OpenJDK7 forest
- Added system timezone support
- Revamped version/release naming scheme to make it proper
- Security fixes
- S7000600, CVE-2011-3547: InputStream skip() information leak
- S7019773, CVE-2011-3548: mutable static AWTKeyStroke.ctor
- S7023640, CVE-2011-3551: Java2D TransformHelper integer overflow
- S7032417, CVE-2011-3552: excessive default UDP socket limit under Secur=
ityManager
- S7046823, CVE-2011-3544: missing SecurityManager checks in scripting en=
gine
- S7055902, CVE-2011-3521: IIOP deserialization code execution
- S7057857, CVE-2011-3554: insufficient pack200 JAR files uncompress erro=
r checks
- S7064341, CVE-2011-3389: HTTPS: block-wise chosen-plaintext attack agai=
nst SSL/TLS (BEAST)
- S7070134, CVE-2011-3558: HotSpot crashes with sigsegv from PorterStemmer
- S7077466, CVE-2011-3556: RMI DGC server remote code execution
- S7083012, CVE-2011-3557: RMI registry privileged code execution
- S7096936, CVE-2011-3560: missing checkSetFactory calls in HttpsURLConne=
ction
---------------------------------------------------------------------------=
-----
ChangeLog:
* Sun Nov 6 2011 Deepak Bhole <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1.7.0.1-2.0.2
- Added missing changelog entry
* Sun Nov 6 2011 Deepak Bhole <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1.7.0.1-2.0.1
- Updated to IcedTea 2.0 tag in the IcedTea OpenJDK7 forest
- Removed obsoleted patches
- Added system timezone support
- Revamp version/release naming scheme to make it proper
- Security fixes
- S7000600, CVE-2011-3547: InputStream skip() information leak
- S7019773, CVE-2011-3548: mutable static AWTKeyStroke.ctor
- S7023640, CVE-2011-3551: Java2D TransformHelper integer overflow
- S7032417, CVE-2011-3552: excessive default UDP socket limit under Secur=
ityManager
- S7046823, CVE-2011-3544: missing SecurityManager checks in scripting en=
gine
- S7055902, CVE-2011-3521: IIOP deserialization code execution
- S7057857, CVE-2011-3554: insufficient pack200 JAR files uncompress erro=
r checks
- S7064341, CVE-2011-3389: HTTPS: block-wise chosen-plaintext attack agai=
nst SSL/TLS (BEAST)
- S7070134, CVE-2011-3558: HotSpot crashes with sigsegv from PorterStemmer
- S7077466, CVE-2011-3556: RMI DGC server remote code execution
- S7083012, CVE-2011-3557: RMI registry privileged code execution
- S7096936, CVE-2011-3560: missing checkSetFactory calls in HttpsURLConne=
ction
---------------------------------------------------------------------------=
-----
This update can be installed with the "yum" update program. Use =
su -c 'yum update java-1.7.0-openjdk' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on t=
he
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
---------------------------------------------------------------------------=
-----
_______________________________________________
package-announce mailing list
Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Posljednje sigurnosne preporuke