Uočeno je više sigurnosnih ranjivosti u programskim paketima java-1.7.0-openjdk te java-1.6.0-openjdk. Zlonamjerni korisnici ih mogu iskoristiti za napad na integritet, dostupnost i povjerljivost sustava.
Paket: | java-1.6.0-openjdk , java-1.7.0-openjdk |
Operacijski sustavi: | Fedora 15, Fedora 16, Fedora 17 |
Kritičnost: | 7.4 |
Problem: | nespecificirana pogreška, pogreška u programskoj funkciji |
Iskorištavanje: | udaljeno |
Posljedica: | dobivanje većih privilegija, izmjena podataka, uskraćivanje usluga (DoS), zaobilaženje postavljenih ograničenja |
Rješenje: | programska zakrpa proizvođača |
CVE: | CVE-2012-1711, CVE-2012-1717, CVE-2012-1716, CVE-2012-1713, CVE-2012-1719, CVE-2012-1718, CVE-2012-1723, CVE-2012-1724, CVE-2012-1725, CVE-2012-0497, CVE-2011-3571, CVE-2012-0503, CVE-2012-0505, CVE-2012-0502, CVE-2011-3563, CVE-2011-5035, CVE-2012-0501 |
Izvorni ID preporuke: | FEDORA-2012-9590 |
Izvor: | Fedora |
Problem: | |
Ranjivosti su povezane s greškom u programskoj funkciji za izračunavanje sažetaka (eng. hash) te s više nespecificiranih grešaka. |
|
Posljedica: | |
Udaljeni napadač može iskoristiti ranjivosti kako bi ugrozio integritet, dostupnost i povjerljivost sustava. |
|
Rješenje: | |
Kako bi se zaštitili, korisnicima se savjetuje korištenje odgovarajuće programske nadogradnje. |
Izvorni tekst preporuke
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2012-9590
2012-06-17 22:03:27
--------------------------------------------------------------------------------
Name : java-1.7.0-openjdk
Product : Fedora 17
Version : 1.7.0.3
Release : 2.2.1.fc17.8
URL : http://openjdk.java.net/
Summary : OpenJDK Runtime Environment
Description :
The OpenJDK runtime environment.
--------------------------------------------------------------------------------
Update Information:
S7079902, CVE-2012-1711: Refine CORBA data models
S7110720: Issue with vm config file loadingIssue with vm config file
loading
S7143606, CVE-2012-1717: File.createTempFile should be improved for
temporary files created by the platform.
S7143614, CVE-2012-1716: SynthLookAndFeel stability improvement
S7143617, CVE-2012-1713: Improve fontmanager layout lookup operations
S7143851, CVE-2012-1719: Improve IIOP stub and tie generation in RMIC
S7143872, CVE-2012-1718: Improve certificate extension processing
S7145239: Finetune package definition restriction
S7152811, CVE-2012-1723: Issues in client compiler
S7157609, CVE-2012-1724: Issues with loop
S7160677: missing else in fix for 7152811
S7160757, CVE-2012-1725: Problem with hotspot/runtime_classfile
S7165628 JDK InvokeDynamic flaw
--------------------------------------------------------------------------------
ChangeLog:
* Wed Jun 13 2012 jiri Vanek <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1.7.0.3-2.2.1fc16.8
- Fixed broken provides sections
* Mon Jun 11 2012 jiri Vanek <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1.7.0.3-2.2.1fc16.7
- Used newly prepared tarball with security fixes
- Bump to icedtea7-forest-2.2.1
- _mandir/man1/jcmd-name.1 added to alternatives
- Updated rhino.patch
- Modified partially upstreamed patch302 - systemtap.patch
- Temporarly disabled patch102 - java-1.7.0-openjdk-size_t.patch
- Removed already upstreamed patches 104,107,108,301
- java-1.7.0-openjdk-arm-ftbfs.patch
- java-1.7.0-openjdk-system-zlib.patch
- java-1.7.0-openjdk-remove-mimpure-opt.patch
- systemtap-alloc-size-workaround.patch
- patch 105 (java-1.7.0-openjdk-ppc-zero-jdk.patch) have become 104
- patch 106 (java-1.7.0-openjdk-ppc-zero-hotspot.patch) have become 105
- Added build requires zip, which was untill now dependence of dependence
- Access gnome brridge jar forced to be 644
* Fri May 25 2012 Deepak Bhole <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1.7.0.3-2.1.fc16.6
- Miscellaneous fixes brought in from RHEL branch
- Resolves: rhbz#825255: Added ALT_STRIP_POLICY so that debug info is not
stripped
- Moved Patch #7 (usage of system zlib) to #107
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update java-1.7.0-openjdk' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
https://admin.fedoraproject.org/mailman/listinfo/package-announce
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2012-9593
2012-06-17 22:03:33
--------------------------------------------------------------------------------
Name : java-1.7.0-openjdk
Product : Fedora 16
Version : 1.7.0.3
Release : 2.2.1.fc16.7
URL : http://openjdk.java.net/
Summary : OpenJDK Runtime Environment
Description :
The OpenJDK runtime environment.
--------------------------------------------------------------------------------
Update Information:
S7079902, CVE-2012-1711: Refine CORBA data models
S7110720: Issue with vm config file loadingIssue with vm config file
loading
S7143606, CVE-2012-1717: File.createTempFile should be improved for
temporary files created by the platform.
S7143614, CVE-2012-1716: SynthLookAndFeel stability improvement
S7143617, CVE-2012-1713: Improve fontmanager layout lookup operations
S7143851, CVE-2012-1719: Improve IIOP stub and tie generation in RMIC
S7143872, CVE-2012-1718: Improve certificate extension processing
S7145239: Finetune package definition restriction
S7152811, CVE-2012-1723: Issues in client compiler
S7157609, CVE-2012-1724: Issues with loop
S7160677: missing else in fix for 7152811
S7160757, CVE-2012-1725: Problem with hotspot/runtime_classfile
S7165628 JDK InvokeDynamic flaw
--------------------------------------------------------------------------------
ChangeLog:
* Mon Jun 11 2012 jiri Vanek <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1.7.0.3-2.2.1fc16.7
- Used newly prepared tarball with security fixes
- Bump to icedtea7-forest-2.2.1
- _mandir/man1/jcmd-name.1 added to alternatives
- Updated rhino.patch
- Modified partially upstreamed patch302 - systemtap.patch
- Temporarly disabled patch102 - java-1.7.0-openjdk-size_t.patch
- Removed already upstreamed patches 104,107,108,301
- java-1.7.0-openjdk-arm-ftbfs.patch
- java-1.7.0-openjdk-system-zlib.patch
- java-1.7.0-openjdk-remove-mimpure-opt.patch
- systemtap-alloc-size-workaround.patch
- patch 105 (java-1.7.0-openjdk-ppc-zero-jdk.patch) have become 104
- patch 106 (java-1.7.0-openjdk-ppc-zero-hotspot.patch) have become 105
- Access gnome brridge jar forced to be 644
* Fri May 25 2012 Deepak Bhole <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1.7.0.3-2.1.fc16.6
- Miscellaneous fixes brought in from RHEL branch
- Resolves: rhbz#825255: Added ALT_STRIP_POLICY so that debug info is not
stripped
- Moved Patch #7 (usage of system zlib) to #107
* Tue May 1 2012 Deepak Bhole <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1.7.0.3-2.1.fc16.5
- Removed VisualVM requirements
* Mon Mar 26 2012 Deepak Bhole <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1.7.0.3-2.1.fc16.4
- Merged with F17 branch
* Wed Mar 21 2012 Deepak Bhole <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1.7.0.3-2.1.fc16.3
- Reverted fix for rh740762
* Mon Mar 12 2012 Deepak Bhole <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1.7.0.3-2.1.fc16.2
- Resolved rh740762: java.library.path is missing some paths
* Fri Feb 24 2012 Deepak Bhole <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1.7.0.3-2.1.fc16.1
- Added flag so that debuginfo is built into classfiles (rhbz# 796400)
- Updated rhino.patch to build scripting support (rhbz# 796398)
* Tue Feb 14 2012 Deepak Bhole <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1.7.0.3-2.1
- Updated to OpenJDK7u3/IcedTea7 2.1
- Security fixes:
- S7112642, CVE-2012-0497: Incorrect checking for graphics rendering object
- S7082299, CVE-2011-3571: AtomicReferenceArray insufficient array type check
- S7110687, CVE-2012-0503: Unrestricted use of TimeZone.setDefault
- S7110700, CVE-2012-0505: Incomplete info in the deserialization exception
- S7110683, CVE-2012-0502: KeyboardFocusManager focus stealing
- S7088367, CVE-2011-3563: JavaSound incorrect bounds check
- S7126960, CVE-2011-5035: Add property to limit number of request headers to
the HTTP Server
- S7118283, CVE-2012-0501: Off-by-one bug in ZIP reading code
- S7110704, CVE-2012-0506: CORBA fix
- Add patch to fix compilation with GCC 4.7
* Tue Nov 15 2011 Deepak Bhole <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1.7.0.1-2.0.3
- Added patch to fix bug in jdk_generic_profile.sh
- Compile with generic profile to use system libraries
- Made remove-intree-libraries.sh more robust
- Added lcms requirement
- Added patch to fix glibc name clash
- Updated java version to include -icedtea
* Sun Nov 6 2011 Deepak Bhole <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1.7.0.1-2.0.2
- Added missing changelog entry
* Sun Nov 6 2011 Deepak Bhole <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1.7.0.1-2.0.1
- Updated to IcedTea 2.0 tag in the IcedTea OpenJDK7 forest
- Removed obsoleted patches
- Added system timezone support
- Revamp version/release naming scheme to make it proper
- Security fixes
- S7000600, CVE-2011-3547: InputStream skip() information leak
- S7019773, CVE-2011-3548: mutable static AWTKeyStroke.ctor
- S7023640, CVE-2011-3551: Java2D TransformHelper integer overflow
- S7032417, CVE-2011-3552: excessive default UDP socket limit under
SecurityManager
- S7046823, CVE-2011-3544: missing SecurityManager checks in scripting engine
- S7055902, CVE-2011-3521: IIOP deserialization code execution
- S7057857, CVE-2011-3554: insufficient pack200 JAR files uncompress error
checks
- S7064341, CVE-2011-3389: HTTPS: block-wise chosen-plaintext attack against
SSL/TLS (BEAST)
- S7070134, CVE-2011-3558: HotSpot crashes with sigsegv from PorterStemmer
- S7077466, CVE-2011-3556: RMI DGC server remote code execution
- S7083012, CVE-2011-3557: RMI registry privileged code execution
- S7096936, CVE-2011-3560: missing checkSetFactory calls in HttpsURLConnection
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update java-1.7.0-openjdk' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
https://admin.fedoraproject.org/mailman/listinfo/package-announce
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2012-9541
2012-06-15 23:10:16
--------------------------------------------------------------------------------
Name : java-1.6.0-openjdk
Product : Fedora 15
Version : 1.6.0.0
Release : 65.1.10.8.fc15
URL : http://icedtea.classpath.org/
Summary : OpenJDK Runtime Environment
Description :
The OpenJDK runtime environment.
--------------------------------------------------------------------------------
Update Information:
Security fixes
S7079902, CVE-2012-1711: Refine CORBA data models
S7110720: Issue with vm config file loadingIssue with vm config file
loading
S7143606, CVE-2012-1717: File.createTempFile should be improved for
temporary files created by the platform.
S7143614, CVE-2012-1716: SynthLookAndFeel stability improvement
S7143617, CVE-2012-1713: Improve fontmanager layout lookup operations
S7143851, CVE-2012-1719: Improve IIOP stub and tie generation in RMIC
S7143872, CVE-2012-1718: Improve certificate extension processing
S7145239: Finetune package definition restriction
S7152811, CVE-2012-1723: Issues in client compiler
S7157609, CVE-2012-1724: Issues with loop
S7160677: missing else in fix for 7152811
S7160757, CVE-2012-1725: Problem with hotspot/runtime_classfile
Bug fixes
PR1018: JVM fails due to SEGV during rendering some Unicode characters
(part of 6886358)
- Updated to IcedTea6 1.10.7
- Removed patch5
- Fixed build with GCC 4.7
- Bug fixes
- PR732: Use xsltproc for bootstrap xslt in place of Xerces/Xalan
- PR881: Sign tests (wsse.policy.basic) failures with OpenJDK6
- Specify both source and target in IT_GET_DTDTYPE_CHECK.
- PR758: [regression] javah from 6hg/b23 generates `jlong' from `private int'
- Install nss.cfg into j2re-image too.
- Backports
- S6792400: Avoid loading of Normalizer resources for simple uses
- S7103224: collision between __LEAF define in interfaceSupport.hpp and
/usr/include/sys/cdefs.h with gcc
- S7140882: Don't return booleans from methods returning pointers
- Updated to IcedTea6-1.11.2
- Bug fixes
- RH789154: javac error messages no longer contain the full path to the
offending file:
- PR797: Compiler error message does not display entire file name and path
- PR881: Sign tests (wsse.policy.basic) failures with OpenJDK6
- PR886: 6-1.11.1 fails to build CACAO on ppc
- Specify both source and target in IT_GET_DTDTYPE_CHECK.
- Install nss.cfg into j2re-image too.
- PR584: Don't use shared Eden in incremental mode.
- Backports
- S6792400: Avoid loading of Normalizer resources for simple uses
--------------------------------------------------------------------------------
ChangeLog:
* Fri Jun 8 2012 Jiri Vanek <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1:1.6.0.0-64.1.10.8
- Updated to IcedTea6 1.10.8
- Modified patch3, java-1.6.0-openjdk-java-access-bridge-security.patch:
-
com.sun.org.apache.xerces.internal.utils.,com.sun.org.apache.xalan.internal.utils.
- packages added to patch and added also to package.definition
- Access gnome bridge jar forced to be 644
* Thu May 31 2012 Jiri Vanek <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1:1.6.0.0-64.1.10.7
- Updated to IcedTea6 1.10.7
- Removed patch5
- Fixed build with GCC 4.7
- Bug fixes
- PR732: Use xsltproc for bootstrap xslt in place of Xerces/Xalan
- PR881: Sign tests (wsse.policy.basic) failures with OpenJDK6
- Specify both source and target in IT_GET_DTDTYPE_CHECK.
- PR758: [regression] javah from 6hg/b23 generates `jlong' from `private int'
- Install nss.cfg into j2re-image too.
- Backports
- S6792400: Avoid loading of Normalizer resources for simple uses
- S7103224: collision between __LEAF define in interfaceSupport.hpp and
/usr/include/sys/cdefs.h with gcc
- S7140882: Don't return booleans from methods returning pointers
* Sat Feb 11 2012 Jiri Vanek <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1:1.6.0.0-63.1.10.6
- Updated to IcedTea6 1.10.6
- Security fixes
- S7082299: Fix in AtomicReferenceArray
- S7088367: Fix issues in java sound
- S7110683: Issues with some KeyboardFocusManager method
- S7110687: Issues with TimeZone class
- S7110700: Enhance exception throwing mechanism in ObjectStreamClass
- S7110704: Issues with some method in corba
- S7112642: Incorrect checking for graphics rendering object
- S7118283: Better input parameter checking in zip file processing
- S7126960: Add property to limit number of request headers to the HTTP Server
- Bug fixes
- RH580478: Desktop files should not use hardcoded path
* Tue Jan 24 2012 Jiri Vanek <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1:1.6.0.0-62.1.10.5
- Updated to IcedTea6 1.10.5
- Backports
S7034464, Support transparent large pages on Linux
S7037939, NUMA: Disable adaptive resizing if SHM large pages are used
S7102369, RH751203: remove java.rmi.server.codebase property parsing from
registyimpl
S7094468, RH751203: rmiregistry clean up
S7103725, RH767129: REGRESSION â?? 6u29 breaks ssl connectivity using
TLS_DH_anon_WITH_AES_128_CBC_SHA
S6851973, PR830: ignore incoming channel binding if acceptor does not set
one
S7091528, javadoc attempts to parse .class files
* Fri Nov 25 2011 Omair Majid <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1:1.6.0.0-61.1.10.4
- Fix rhbz#741821
* Thu Oct 13 2011 Jiri Vanek <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1:1.6.0.0-60.1.10.4
- updated to icedtea6 1.10.4
- Security fixes
- S7000600, CVE-2011-3547: InputStream skip() information leak
- S7019773, CVE-2011-3548: mutable static AWTKeyStroke.ctor
- S7023640, CVE-2011-3551: Java2D TransformHelper integer overflow
- S7032417, CVE-2011-3552: excessive default UDP socket limit under
SecurityManager
- S7046823, CVE-2011-3544: missing SecurityManager checks in scripting engine
- S7055902, CVE-2011-3521: IIOP deserialization code execution
- S7057857, CVE-2011-3554: insufficient pack200 JAR files uncompress error
checks
- S7064341, CVE-2011-3389: HTTPS: block-wise chosen-plaintext attack against
SSL/TLS (BEAST)
- S7070134, CVE-2011-3558: HotSpot crashes with sigsegv from PorterStemmer
- S7077466, CVE-2011-3556: RMI DGC server remote code execution
- S7083012, CVE-2011-3557: RMI registry privileged code execution
- S7096936, CVE-2011-3560: missing checkSetFactory calls in HttpsURLConnection
- Bug fixes
- RH727195 : Japanese font mappings are broken
- Backports
- S6826104, RH730015: Getting a NullPointer exception when clicked on
Application & Toolkit Modal dialog
- Zero/Shark
- PR690: Shark fails to JIT using hs20.
- PR696: Zero fails to handle fast_aldc and fast_aldc_w in hs20.
* Fri Jul 22 2011 Jiri Vanek <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1:1.6.0.0-59.1.10.3
- updated to icedtea6 1.10.3
- http://blog.fuseyism.com/index.php/2011/07/21/icedtea6-1103-released/
* Fri Jun 10 2011 Jiri Vanek <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1:1.6.0.0-58.1.10.2
- added requires: fontconfig
- resolves: rhbz#708201
* Mon Jun 6 2011 Jiri Vanek <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1:1.6.0.0-58.1.10.2
- Resolves: rhbz#709375
- Bumped to IcedTea6 1.10.2
- RH706250, S6213702, CVE-2011-0872: (so) non-blocking sockets with TCP urgent
disabled get still selected for read ops (win)
- RH706106, S6618658, CVE-2011-0865: Vulnerability in deserialization
- RH706111, S7012520, CVE-2011-0815: Heap overflow vulnerability in
FileDialog.show() (win)
- RH706139, S7013519, CVE-2011-0822, CVE-2011-0862: Integer overflows in 2D
code
- RH706153, S7013969, CVE-2011-0867: NetworkInterface.toString can reveal
bindings
- RH706234, S7013971, CVE-2011-0869: Vulnerability in SAAJ
- RH706239, S7016340, CVE-2011-0870: Vulnerability in SAAJ
- RH706241, S7016495, CVE-2011-0868: Crash in Java 2D transforming an image
with scale close to zero
- RH706248, S7020198, CVE-2011-0871: ImageIcon creates Component with null acc
- RH706245, S7020373, CVE-2011-0864: JSR rewriting can overflow memory address
size variables
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update java-1.6.0-openjdk' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
https://admin.fedoraproject.org/mailman/listinfo/package-announce
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2012-9545
2012-06-15 23:10:26.821146
--------------------------------------------------------------------------------
Name : java-1.6.0-openjdk
Product : Fedora 16
Version : 1.6.0.0
Release : 67.1.11.3.fc16
URL : http://icedtea.classpath.org/
Summary : OpenJDK Runtime Environment
Description :
The OpenJDK runtime environment.
--------------------------------------------------------------------------------
Update Information:
Security fixes
S7079902, CVE-2012-1711: Refine CORBA data models
S7110720: Issue with vm config file loadingIssue with vm config file
loading
S7143606, CVE-2012-1717: File.createTempFile should be improved for
temporary files created by the platform.
S7143614, CVE-2012-1716: SynthLookAndFeel stability improvement
S7143617, CVE-2012-1713: Improve fontmanager layout lookup operations
S7143851, CVE-2012-1719: Improve IIOP stub and tie generation in RMIC
S7143872, CVE-2012-1718: Improve certificate extension processing
S7145239: Finetune package definition restriction
S7152811, CVE-2012-1723: Issues in client compiler
S7157609, CVE-2012-1724: Issues with loop
S7160677: missing else in fix for 7152811
S7160757, CVE-2012-1725: Problem with hotspot/runtime_classfile
Bug fixes
PR1018: JVM fails due to SEGV during rendering some Unicode characters
(part of 6886358)
- Updated to IcedTea6 1.10.7
- Removed patch5
- Fixed build with GCC 4.7
- Bug fixes
- PR732: Use xsltproc for bootstrap xslt in place of Xerces/Xalan
- PR881: Sign tests (wsse.policy.basic) failures with OpenJDK6
- Specify both source and target in IT_GET_DTDTYPE_CHECK.
- PR758: [regression] javah from 6hg/b23 generates `jlong' from `private int'
- Install nss.cfg into j2re-image too.
- Backports
- S6792400: Avoid loading of Normalizer resources for simple uses
- S7103224: collision between __LEAF define in interfaceSupport.hpp and
/usr/include/sys/cdefs.h with gcc
- S7140882: Don't return booleans from methods returning pointers
- Updated to IcedTea6-1.11.2
- Bug fixes
- RH789154: javac error messages no longer contain the full path to the
offending file:
- PR797: Compiler error message does not display entire file name and path
- PR881: Sign tests (wsse.policy.basic) failures with OpenJDK6
- PR886: 6-1.11.1 fails to build CACAO on ppc
- Specify both source and target in IT_GET_DTDTYPE_CHECK.
- Install nss.cfg into j2re-image too.
- PR584: Don't use shared Eden in incremental mode.
- Backports
- S6792400: Avoid loading of Normalizer resources for simple uses
--------------------------------------------------------------------------------
ChangeLog:
* Fri Jun 8 2012 Jiri Vanek <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1:1.6.0.0-67.1.11.3
- Updated to IcedTea6 1.11.3
- Modified patch3, java-1.6.0-openjdk-java-access-bridge-security.patch:
-
com.sun.org.apache.xerces.internal.utils.,com.sun.org.apache.xalan.internal.utils.
- packages added to patch and to package.definition
- Access gnome bridge jar forced to be 644
* Thu May 31 2012 Jiri Vanek <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1:6.0.0-0-66.1.11.2
- Updated to IcedTea6-1.11.2
- Bug fixes
- RH789154: javac error messages no longer contain the full path to the
offending file:
- PR797: Compiler error message does not display entire file name and path
- PR881: Sign tests (wsse.policy.basic) failures with OpenJDK6
- PR886: 6-1.11.1 fails to build CACAO on ppc
- Specify both source and target in IT_GET_DTDTYPE_CHECK.
- Install nss.cfg into j2re-image too.
- PR584: Don't use shared Eden in incremental mode.
- Backports
- S6792400: Avoid loading of Normalizer resources for simple uses
* Sat Feb 11 2012 Jiri Vanek <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1:6.0.0-0-65.1.11.1
- Security update to IcedTea6-1.11.1
- Security fixes
- S7082299, CVE-2011-3571: Fix in AtomicReferenceArray
- S7088367, CVE-2011-3563: Fix issues in java sound
- S7110683, CVE-2012-0502: Issues with some KeyboardFocusManager method
- S7110687, CVE-2012-0503: Issues with TimeZone class
- S7110700, CVE-2012-0505: Enhance exception throwing mechanism in
ObjectStreamClass
- S7110704, CVE-2012-0506: Issues with some method in corba
- S7112642, CVE-2012-0497: Incorrect checking for graphics rendering object
- S7118283, CVE-2012-0501: Better input parameter checking in zip file
processing
- S7126960, CVE-2011-5035: (httpserver) Add property to limit number of
request headers to the HTTP Server
- Bug fixes
- PR865: Patching fails with patches/ecj/jaxws-getdtdtype.patch
* Wed Feb 1 2012 Jiri Vanek <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1:6.0.0-0-64.1.11
- Updated for ARM build based on fixes by Andrew Haley (aph at redhat dot com)
- Added patch100: name-arm-asm-int-fix.patch
* Tue Jan 31 2012 Jiri Vanek <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1:1.6.0.0-63.1.11
- sync with master
- IcedTea6 bumped to 1.11 release
- full release info at:
http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2012-January/017060.html
- removed and deleted patches:
patch5 makefile-xalan-deps.patch
patch6 glibc-name-clash.patch
all were upstreamed
* Tue Jan 24 2012 Jiri Vanek <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1:1.6.0.0-62.1.10.5
- updated to icedtea6 1.10.5
- Backports
S7034464, Support transparent large pages on Linux
S7037939, NUMA: Disable adaptive resizing if SHM large pages are used
S7102369, RH751203: remove java.rmi.server.codebase property parsing from
registyimpl
S7094468, RH751203: rmiregistry clean up
S7103725, RH767129: REGRESSION â?? 6u29 breaks ssl connectivity using
TLS_DH_anon_WITH_AES_128_CBC_SHA
S6851973, PR830: ignore incoming channel binding if acceptor does not set
one
S7091528, javadoc attempts to parse .class files
* Fri Nov 25 2011 Omair Majid <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1:1.6.0.0-61.1.10.4
- Fix rhbz#741821
* Tue Nov 1 2011 Jiri Vanek <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1:1.6.0.0-60.1.10.4
- omajid have added Patch6 as (probably temporally) solution for S7103224 for
buildability on newest glibc libraries.
* Thu Oct 13 2011 Jiri Vanek <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1:1.6.0.0-60.1.10.4
- updated to icedtea6 1.10.4
- Security fixes
- S7000600, CVE-2011-3547: InputStream skip() information leak
- S7019773, CVE-2011-3548: mutable static AWTKeyStroke.ctor
- S7023640, CVE-2011-3551: Java2D TransformHelper integer overflow
- S7032417, CVE-2011-3552: excessive default UDP socket limit under
SecurityManager
- S7046823, CVE-2011-3544: missing SecurityManager checks in scripting engine
- S7055902, CVE-2011-3521: IIOP deserialization code execution
- S7057857, CVE-2011-3554: insufficient pack200 JAR files uncompress error
checks
- S7064341, CVE-2011-3389: HTTPS: block-wise chosen-plaintext attack against
SSL/TLS (BEAST)
- S7070134, CVE-2011-3558: HotSpot crashes with sigsegv from PorterStemmer
- S7077466, CVE-2011-3556: RMI DGC server remote code execution
- S7083012, CVE-2011-3557: RMI registry privileged code execution
- S7096936, CVE-2011-3560: missing checkSetFactory calls in HttpsURLConnection
- Bug fixes
- RH727195 : Japanese font mappings are broken
- Backports
- S6826104, RH730015: Getting a NullPointer exception when clicked on
Application & Toolkit Modal dialog
- Zero/Shark
- PR690: Shark fails to JIT using hs20.
- PR696: Zero fails to handle fast_aldc and fast_aldc_w in hs20.
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update java-1.6.0-openjdk' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Posljednje sigurnosne preporuke