Bug 1731 - Update Candidate: OpenJDK
Summary: Update Candidate: OpenJDK
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 1
Hardware: All Linux
Priority: Normal major
Target Milestone: ---
Assignee: QA Team
QA Contact:
URL: http://www.oracle.com/technetwork/top...
Whiteboard:
Keywords: validated_update
Depends on:
Blocks:
 
Reported: 2011-06-10 09:59 CEST by Hermes Laws
Modified: 2011-09-14 18:32 CEST (History)
5 users (show)

See Also:
Source RPM: java-1.6.0-openjdk
CVE:
Status comment:


Attachments

Description Hermes Laws 2011-06-10 09:59:03 CEST
Description of problem:

Sorry just a question about the new java update.


Version-Release number of selected component (if applicable):

installed today the new 

Version: 1.6.0.0-14.b22.5.mga2
        Momentan installierte Version: 1.6.0.0-14.b22.5.mga2
        Gruppe: Entwicklung/Java
        Architektur: i586
        GröÃe: 85071 kB
        Medium: Keine (Installiert)

How reproducible:


Steps to Reproduce:
1.
2.
3.

Would just be good to know to actived or deactived java for sometime in the browser.
Manuel Hiebel 2011-08-30 09:24:28 CEST

CC: (none) => dmorganec

Manuel Hiebel 2011-08-30 09:56:30 CEST

CC: (none) => lmenut

Comment 1 D Morgan 2011-09-06 00:33:03 CEST
Advisory:

Java-1.6.0-openjdk is victim of several CVE :


- Resolves: rhbz#709375
- Bumped to IcedTea6 1.10.2
- RH706250, S6213702, CVE-2011-0872: (so) non-blocking sockets with TCP urgent
  disabled get still selected for read ops (win)
- RH706106, S6618658, CVE-2011-0865: Vulnerability in deserialization
- RH706111, S7012520, CVE-2011-0815: Heap overflow vulnerability in 
  FileDialog.show() (win)
- RH706139, S7013519, CVE-2011-0822, CVE-2011-0862: Integer overflows in 2D 
  code
- RH706153, S7013969, CVE-2011-0867: NetworkInterface.toString can reveal 
  bindings
- RH706234, S7013971, CVE-2011-0869: Vulnerability in SAAJ
- RH706239, S7016340, CVE-2011-0870: Vulnerability in SAAJ
- RH706241, S7016495, CVE-2011-0868: Crash in Java 2D transforming an image 
  with scale close to zero
- RH706248, S7020198, CVE-2011-0871: ImageIcon creates Component with null acc
- RH706245, S7020373, CVE-2011-0864: JSR rewriting can overflow memory address
  size variables


This update fixes those issues.

Source RPM: http://javadl.sun.com/webapps/download/AutoDL?BundleId=49014 => java-1.6.0-openjdk

D Morgan 2011-09-06 00:33:20 CEST

Assignee: bugsquad => qa-bugs

Comment 2 claire robinson 2011-09-06 12:52:13 CEST
Can somebody please provide steps for testing this update. Thankyou.

CC: (none) => eeeemail

Comment 3 Florian Hubold 2011-09-06 19:20:34 CEST
Well, i'm no Java expert, but this should be it: install/update java-1.6.0-openjdk, make sure that openjdk is the default java with
update-alternatives --config java
and select openjdk there.
Then find and check with an exploit for every CVE mentioned by dmorgan.

CC: (none) => doktor5000

Comment 4 claire robinson 2011-09-06 19:25:09 CEST
Thanks Florian. Not being a security expert though I've no idea where to start with finding exploits for CVE's.
Comment 5 claire robinson 2011-09-06 19:35:26 CEST
Are there any POC's available to test the security fixes in this update?

Thankyou.
Comment 6 Dave Hodgins 2011-09-09 21:18:23 CEST
Using a previously compiled copy of a previously compiled copy of
http://download.oracle.com/javase/tutorial/getStarted/cupojava/unix.html

$ java -version
java version "1.6.0_22"
OpenJDK Runtime Environment (IcedTea6 1.10.2) (fedora-14.b22.5.1.mga1-i386)
OpenJDK Client VM (build 20.0-b11, mixed mode)
[dave@hodgins software]$ java HelloWorldApp
Hello World!

Does this package include a browser plugin?
# update-alternatives --config libjavaplugin.so
There are 2 programs which provide `libjavaplugin.so'.
  Selection    Command
-----------------------------------------------
*+    1        /usr/lib/jvm/java-1.6.0-sun-1.6.0.26/jre/lib/i386/libnpjp2.so
      2        /usr/lib/jvm/java-1.6.0-sun-1.6.0.26/jre/plugin/i386/ns7/libjavaplugin_oji.so

CC: (none) => davidwhodgins

Luc Menut 2011-09-11 19:19:53 CEST

CC: lmenut => (none)

Comment 7 claire robinson 2011-09-12 12:49:39 CEST
There don't appear to be any exploits for the CVE's at securityfocus so we'll just have to ensure it seems to work ok.

icedtea-web is the browser plugin I think for openjdk, Source RPM  : icedtea-web-1.0.2-5.mga1.src.rpm. There isn't any update for it in updates_testing so I'm presuming it's just java itself.

Using the HelloWorldApp you gave Dave.

i586:

$ javac HelloWorldApp.java
$ java HelloWorldApp
Hello World!


Using OddEven from https://secure.wikimedia.org/wikipedia/en/wiki/Java_%28programming_language%29#A_more_comprehensive_example

$ javac OddEven.java
$ java OddEven (entered 99)
Odd
$ java OddEven (entered 56)
Even

Seems OK.
Comment 8 claire robinson 2011-09-12 13:02:51 CEST
X86_64:

$ javac HelloWorldApp.java
$ java HelloWorldApp
Hello World!



$ javac OddEven.java
$ java OddEven
Odd (entered 345)
$ java OddEven
Even (entered 456)


Seems OK.

Update Validated

Advisory:

-------------
Java-1.6.0-openjdk is victim of several CVE :


- Resolves: rhbz#709375
- Bumped to IcedTea6 1.10.2
- RH706250, S6213702, CVE-2011-0872: (so) non-blocking sockets with TCP urgent
  disabled get still selected for read ops (win)
- RH706106, S6618658, CVE-2011-0865: Vulnerability in deserialization
- RH706111, S7012520, CVE-2011-0815: Heap overflow vulnerability in 
  FileDialog.show() (win)
- RH706139, S7013519, CVE-2011-0822, CVE-2011-0862: Integer overflows in 2D 
  code
- RH706153, S7013969, CVE-2011-0867: NetworkInterface.toString can reveal 
  bindings
- RH706234, S7013971, CVE-2011-0869: Vulnerability in SAAJ
- RH706239, S7016340, CVE-2011-0870: Vulnerability in SAAJ
- RH706241, S7016495, CVE-2011-0868: Crash in Java 2D transforming an image 
  with scale close to zero
- RH706248, S7020198, CVE-2011-0871: ImageIcon creates Component with null acc
- RH706245, S7020373, CVE-2011-0864: JSR rewriting can overflow memory address
  size variables


This update fixes those issues.
-------------

SRPM: 	java-1.6.0-openjdk-1.6.0.0-14.b22.5.1.mga1.src.rpm

Could somebody from sysadmin please push from core/updates_testing to core/updates.

Thankyou!

Keywords: (none) => validated_update
CC: (none) => sysadmin-bugs

claire robinson 2011-09-12 13:03:31 CEST

Hardware: i586 => All
Version: Cauldron => 1
Summary: Is this patch allready in the new openjdk => Update Candidate: OpenJDK

Comment 9 D Morgan 2011-09-14 18:32:10 CEST
update pushed.

Status: NEW => RESOLVED
Resolution: (none) => FIXED


Note You need to log in before you can comment on or make changes to this bug.