Otkriven je niz sigurnosnih propusta u radu programskog paketa java-1.6.0-openjdk. Udaljenom napadaču omogućuju utjecanje na pouzdanost, integritet i dostupnost podataka, te otkrivanje osjetljivih informacija.
Paket:
java-1.6.0-openjdk
Operacijski sustavi:
openSUSE 11.4
Kritičnost:
8.7
Problem:
nespecificirana pogreška, pogreška u programskoj komponenti
Propusti su posljedica višestrukih nespecificiranih pogrešaka komponentama Java Runtime Environment (JRE) i Virtual Desktop Infrastructure (VDI). Za više informacija savjetuje se čitanje izvornog upozorenja.
Posljedica:
Udaljeni napadač može iskoristiti navedene propuste za narušavanje povjerljivosti, integriteta i dostupnosti sustava.
Rješenje:
Svim korisnicima se savjetuje korištenje nadogradnje koja otklanja opisane propuste.
openSUSE Security Update: java-1_6_0-openjdk: Update to iced tea 1.11.1 b24
security release
______________________________________________________________________________
Announcement ID: openSUSE-SU-2012:0309-1
Rating: important
References: #747208
Cross-References: CVE-2011-3563 CVE-2011-3571 CVE-2011-5035
CVE-2012-0497 CVE-2012-0501 CVE-2012-0502
CVE-2012-0503 CVE-2012-0505 CVE-2012-0506
Affected Products:
openSUSE 11.4
______________________________________________________________________________
An update that fixes 9 vulnerabilities is now available.
Description:
java-1_6_0-openjdk was updated to the b24 release, fixing
multiple security issues:
* Security fixes
- S7082299, CVE-2011-3571: Fix inAtomicReferenceArray
- S7088367, CVE-2011-3563: Fix issues in java sound
- S7110683, CVE-2012-0502: Issues with some
KeyboardFocusManager method
- S7110687, CVE-2012-0503: Issues with TimeZone class
- S7110700, CVE-2012-0505: Enhance exception throwing
mechanism in ObjectStreamClass
- S7110704, CVE-2012-0506: Issues with some method in corba
- S7112642, CVE-2012-0497: Incorrect checking for graphics
rendering object
- S7118283, CVE-2012-0501: Better input parameter checking
in zip file processing
- S7126960, CVE-2011-5035: (httpserver) Add property to
limit number of request headers to the HTTP Server
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 11.4:
zypper in -t patch java-1_6_0-openjdk-5856
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 11.4 (i586 x86_64):
java-1_6_0-openjdk-1.6.0.0_b24.1.11.1-0.3.2
java-1_6_0-openjdk-devel-1.6.0.0_b24.1.11.1-0.3.2
- openSUSE 11.4 (i586):
java-1_6_0-openjdk-demo-1.6.0.0_b24.1.11.1-0.3.2
java-1_6_0-openjdk-javadoc-1.6.0.0_b24.1.11.1-0.3.2
java-1_6_0-openjdk-src-1.6.0.0_b24.1.11.1-0.3.2
References:
http://support.novell.com/security/cve/CVE-2011-3563.html
http://support.novell.com/security/cve/CVE-2011-3571.html
http://support.novell.com/security/cve/CVE-2011-5035.html
http://support.novell.com/security/cve/CVE-2012-0497.html
http://support.novell.com/security/cve/CVE-2012-0501.html
http://support.novell.com/security/cve/CVE-2012-0502.html
http://support.novell.com/security/cve/CVE-2012-0503.html
http://support.novell.com/security/cve/CVE-2012-0505.html
http://support.novell.com/security/cve/CVE-2012-0506.html
https://bugzilla.novell.com/747208
--
To unsubscribe, e-mail: Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
For additional commands, e-mail: Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
Posljednje sigurnosne preporuke