lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Mon, 10 Sep 2012 16:31:00 +0200
Subject: [ MDVSA-2012:150 ] java-1.6.0-openjdk

Hash: SHA1


 Mandriva Linux Security Advisory                         MDVSA-2012:150

 Package : java-1.6.0-openjdk
 Date    : September 10, 2012
 Affected: Enterprise Server 5.0

 Problem Description:

 Multiple security issues were identified and fixed in OpenJDK
 Unspecified vulnerability in the Java Runtime Environment (JRE)
 component in Oracle Java SE 7 Update 6 and earlier, and 6 Update 34
 and earlier, has no impact and remote attack vectors involving AWT
 and a security-in-depth issue that is not directly exploitable but
 which can be used to aggravate security vulnerabilities that can be
 directly exploited. NOTE: this identifier was assigned by the Oracle
 CNA, but CVE is not intended to cover defense-in-depth issues that are
 only exposed by the presence of other vulnerabilities (CVE-2012-0547).
 Unspecified vulnerability in the Java Runtime Environment (JRE)
 component in Oracle Java SE 7 Update 6 and earlier allows remote
 attackers to affect confidentiality, integrity, and availability
 via unknown vectors related to Beans, a different vulnerability than
 CVE-2012-3136 (CVE-2012-1682).
 The updated packages provides icedtea6-1.11.4 which is not vulnerable
 to these issues.


 Updated Packages:

 Mandriva Enterprise Server 5:
 286dbb39a335671d71463907eb367c30  mes5/i586/java-1.6.0-openjdk-
 e5f5fc7abaf8c9cfd7bb6497c0bdce82  mes5/i586/java-1.6.0-openjdk-demo-
 088aa2775b4e66dede9492d4cd51f8ec  mes5/i586/java-1.6.0-openjdk-devel-
 b628e97ddf02083759cc434019eafc99  mes5/i586/java-1.6.0-openjdk-javadoc-
 05fbc9d227be560f44c4c7dab844f5d9  mes5/i586/java-1.6.0-openjdk-src- 
 99a8a99f80ae162704ad4bdb5cee3f03  mes5/SRPMS/java-1.6.0-openjdk-

 Mandriva Enterprise Server 5/X86_64:
 35672929025893cc919f96f6a3f5a64d  mes5/x86_64/java-1.6.0-openjdk-
 aba364efac24a36a18701730a431316f  mes5/x86_64/java-1.6.0-openjdk-demo-
 2ab69f1c6eb159fae58ef41b0c6db727  mes5/x86_64/java-1.6.0-openjdk-devel-
 4c9dd84ed0e30d56032bf43aca6625bd  mes5/x86_64/java-1.6.0-openjdk-javadoc-
 96172e0de881538984e6e1086d383030  mes5/x86_64/java-1.6.0-openjdk-src- 
 99a8a99f80ae162704ad4bdb5cee3f03  mes5/SRPMS/java-1.6.0-openjdk-

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver 0x22458A98

 You can view other update advisories for Mandriva Linux at:

 If you want to report vulnerabilities, please contact


 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
Version: GnuPG v1.4.11 (GNU/Linux)


Powered by blists - more mailing lists