| Summary: | Update Candidate: OpenJDK | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | Hermes Laws <hermeslaws> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | |
| Severity: | major | ||
| Priority: | Normal | CC: | davidwhodgins, dmorganec, doktor5000, eeeemail, sysadmin-bugs |
| Version: | 1 | Keywords: | validated_update |
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| URL: | http://www.oracle.com/technetwork/topics/security/javacpujune2011-313339.html | ||
| Whiteboard: | |||
| Source RPM: | java-1.6.0-openjdk | CVE: | |
| Status comment: | |||
|
Manuel Hiebel
2011-08-30 09:24:28 CEST
CC:
(none) =>
dmorganec
Manuel Hiebel
2011-08-30 09:56:30 CEST
CC:
(none) =>
lmenut Advisory: Java-1.6.0-openjdk is victim of several CVE : - Resolves: rhbz#709375 - Bumped to IcedTea6 1.10.2 - RH706250, S6213702, CVE-2011-0872: (so) non-blocking sockets with TCP urgent disabled get still selected for read ops (win) - RH706106, S6618658, CVE-2011-0865: Vulnerability in deserialization - RH706111, S7012520, CVE-2011-0815: Heap overflow vulnerability in FileDialog.show() (win) - RH706139, S7013519, CVE-2011-0822, CVE-2011-0862: Integer overflows in 2D code - RH706153, S7013969, CVE-2011-0867: NetworkInterface.toString can reveal bindings - RH706234, S7013971, CVE-2011-0869: Vulnerability in SAAJ - RH706239, S7016340, CVE-2011-0870: Vulnerability in SAAJ - RH706241, S7016495, CVE-2011-0868: Crash in Java 2D transforming an image with scale close to zero - RH706248, S7020198, CVE-2011-0871: ImageIcon creates Component with null acc - RH706245, S7020373, CVE-2011-0864: JSR rewriting can overflow memory address size variables This update fixes those issues. Source RPM:
http://javadl.sun.com/webapps/download/AutoDL?BundleId=49014 =>
java-1.6.0-openjdk
D Morgan
2011-09-06 00:33:20 CEST
Assignee:
bugsquad =>
qa-bugs Can somebody please provide steps for testing this update. Thankyou. CC:
(none) =>
eeeemail Well, i'm no Java expert, but this should be it: install/update java-1.6.0-openjdk, make sure that openjdk is the default java with update-alternatives --config java and select openjdk there. Then find and check with an exploit for every CVE mentioned by dmorgan. CC:
(none) =>
doktor5000 Thanks Florian. Not being a security expert though I've no idea where to start with finding exploits for CVE's. Are there any POC's available to test the security fixes in this update? Thankyou. Using a previously compiled copy of a previously compiled copy of http://download.oracle.com/javase/tutorial/getStarted/cupojava/unix.html $ java -version java version "1.6.0_22" OpenJDK Runtime Environment (IcedTea6 1.10.2) (fedora-14.b22.5.1.mga1-i386) OpenJDK Client VM (build 20.0-b11, mixed mode) [dave@hodgins software]$ java HelloWorldApp Hello World! Does this package include a browser plugin? # update-alternatives --config libjavaplugin.so There are 2 programs which provide `libjavaplugin.so'. Selection Command ----------------------------------------------- *+ 1 /usr/lib/jvm/java-1.6.0-sun-1.6.0.26/jre/lib/i386/libnpjp2.so 2 /usr/lib/jvm/java-1.6.0-sun-1.6.0.26/jre/plugin/i386/ns7/libjavaplugin_oji.so CC:
(none) =>
davidwhodgins
Luc Menut
2011-09-11 19:19:53 CEST
CC:
lmenut =>
(none) There don't appear to be any exploits for the CVE's at securityfocus so we'll just have to ensure it seems to work ok. icedtea-web is the browser plugin I think for openjdk, Source RPM : icedtea-web-1.0.2-5.mga1.src.rpm. There isn't any update for it in updates_testing so I'm presuming it's just java itself. Using the HelloWorldApp you gave Dave. i586: $ javac HelloWorldApp.java $ java HelloWorldApp Hello World! Using OddEven from https://secure.wikimedia.org/wikipedia/en/wiki/Java_%28programming_language%29#A_more_comprehensive_example $ javac OddEven.java $ java OddEven (entered 99) Odd $ java OddEven (entered 56) Even Seems OK. X86_64: $ javac HelloWorldApp.java $ java HelloWorldApp Hello World! $ javac OddEven.java $ java OddEven Odd (entered 345) $ java OddEven Even (entered 456) Seems OK. Update Validated Advisory: ------------- Java-1.6.0-openjdk is victim of several CVE : - Resolves: rhbz#709375 - Bumped to IcedTea6 1.10.2 - RH706250, S6213702, CVE-2011-0872: (so) non-blocking sockets with TCP urgent disabled get still selected for read ops (win) - RH706106, S6618658, CVE-2011-0865: Vulnerability in deserialization - RH706111, S7012520, CVE-2011-0815: Heap overflow vulnerability in FileDialog.show() (win) - RH706139, S7013519, CVE-2011-0822, CVE-2011-0862: Integer overflows in 2D code - RH706153, S7013969, CVE-2011-0867: NetworkInterface.toString can reveal bindings - RH706234, S7013971, CVE-2011-0869: Vulnerability in SAAJ - RH706239, S7016340, CVE-2011-0870: Vulnerability in SAAJ - RH706241, S7016495, CVE-2011-0868: Crash in Java 2D transforming an image with scale close to zero - RH706248, S7020198, CVE-2011-0871: ImageIcon creates Component with null acc - RH706245, S7020373, CVE-2011-0864: JSR rewriting can overflow memory address size variables This update fixes those issues. ------------- SRPM: java-1.6.0-openjdk-1.6.0.0-14.b22.5.1.mga1.src.rpm Could somebody from sysadmin please push from core/updates_testing to core/updates. Thankyou! Keywords:
(none) =>
validated_update
claire robinson
2011-09-12 13:03:31 CEST
Hardware:
i586 =>
All update pushed. Status:
NEW =>
RESOLVED |
Description of problem: Sorry just a question about the new java update. Version-Release number of selected component (if applicable): installed today the new Version: 1.6.0.0-14.b22.5.mga2 Momentan installierte Version: 1.6.0.0-14.b22.5.mga2 Gruppe: Entwicklung/Java Architektur: i586 GröÃe: 85071 kB Medium: Keine (Installiert) How reproducible: Steps to Reproduce: 1. 2. 3. Would just be good to know to actived or deactived java for sometime in the browser.