lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1Sgbv4-0006mG-50@titan.mandriva.com>
Date: Mon, 18 Jun 2012 15:23:01 +0200
From: security@...driva.com
To: full-disclosure@...ts.grok.org.uk
Subject: [ MDVSA-2012:095 ] java-1.6.0-openjdk

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2012:095
 http://www.mandriva.com/security/
 _______________________________________________________________________

 Package : java-1.6.0-openjdk
 Date    : June 18, 2012
 Affected: 2010.1, 2011., Enterprise Server 5.0
 _______________________________________________________________________

 Problem Description:

 Multiple security issues were identified and fixed in OpenJDK
 (icedtea6):
 
 * S7079902, CVE-2012-1711: Refine CORBA data models
 * S7143617, CVE-2012-1713: Improve fontmanager layout lookup operations
 * S7143614, CVE-2012-1716: SynthLookAndFeel stability improvement
 * S7143606, CVE-2012-1717: File.createTempFile should be improved
 for temporary files created by the platform.
 * S7143872, CVE-2012-1718: Improve certificate extension processing
 * S7143851, CVE-2012-1719: Improve IIOP stub and tie generation in RMIC
 * S7152811, CVE-2012-1723: Issues in client compiler
 * S7157609, CVE-2012-1724: Issues with loop
 * S7160757, CVE-2012-1725: Problem with hotspot/runtime_classfile
 * S7110720: Issue with vm config file loadingIssue with vm config
 file loading
 * S7145239: Finetune package definition restriction
 * S7160677: missing else in fix for 7152811
 
 The updated packages provides icedtea6-1.11.3 which is not vulnerable
 to these issues.
 _______________________________________________________________________

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1711
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1713
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1716
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1717
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1718
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1719
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1723
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1724
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1725
 http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html
 http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2012-June/019076.html
 _______________________________________________________________________

 Updated Packages:

 Mandriva Linux 2010.1:
 02c1a7a3563478acb220758d7cc4b59a  2010.1/i586/java-1.6.0-openjdk-1.6.0.0-26.b24.1mdv2010.2.i586.rpm
 d726d77a80cbcbb2950877c5042bda69  2010.1/i586/java-1.6.0-openjdk-demo-1.6.0.0-26.b24.1mdv2010.2.i586.rpm
 fe64aa7633dcfa4eb0fe67dfc390c435  2010.1/i586/java-1.6.0-openjdk-devel-1.6.0.0-26.b24.1mdv2010.2.i586.rpm
 043ace12873a531986f1ae954cc3d8cd  2010.1/i586/java-1.6.0-openjdk-javadoc-1.6.0.0-26.b24.1mdv2010.2.i586.rpm
 b4d810861dc6a7b909ec48737920f5fc  2010.1/i586/java-1.6.0-openjdk-src-1.6.0.0-26.b24.1mdv2010.2.i586.rpm 
 a6a38f5bb7754d779871b2104aec6fc8  2010.1/SRPMS/java-1.6.0-openjdk-1.6.0.0-26.b24.1mdv2010.2.src.rpm

 Mandriva Linux 2010.1/X86_64:
 594bfca5dc2fba096ffaa21698e2c7a3  2010.1/x86_64/java-1.6.0-openjdk-1.6.0.0-26.b24.1mdv2010.2.x86_64.rpm
 fb01e3019f1f5e823287a39c68f1170c  2010.1/x86_64/java-1.6.0-openjdk-demo-1.6.0.0-26.b24.1mdv2010.2.x86_64.rpm
 f6363ce6f9f23a5dbacc33c8c39ebdc9  2010.1/x86_64/java-1.6.0-openjdk-devel-1.6.0.0-26.b24.1mdv2010.2.x86_64.rpm
 b32e4edd1959e9974ee8c7dcaf4058d3  2010.1/x86_64/java-1.6.0-openjdk-javadoc-1.6.0.0-26.b24.1mdv2010.2.x86_64.rpm
 1348417b4ea0072122f6b730d6d6dc63  2010.1/x86_64/java-1.6.0-openjdk-src-1.6.0.0-26.b24.1mdv2010.2.x86_64.rpm 
 a6a38f5bb7754d779871b2104aec6fc8  2010.1/SRPMS/java-1.6.0-openjdk-1.6.0.0-26.b24.1mdv2010.2.src.rpm

 Mandriva Linux 2011:
 674379bdf52c4a41d3305936c7eff1aa  2011/i586/java-1.6.0-openjdk-1.6.0.0-26.b24.1-mdv2011.0.i586.rpm
 63d8a5d6bf4785a0421385fa98529430  2011/i586/java-1.6.0-openjdk-demo-1.6.0.0-26.b24.1-mdv2011.0.i586.rpm
 13935b834116870ca15a16a49c979a9b  2011/i586/java-1.6.0-openjdk-devel-1.6.0.0-26.b24.1-mdv2011.0.i586.rpm
 43256750b71f5d1fb83a101557d8f4f8  2011/i586/java-1.6.0-openjdk-javadoc-1.6.0.0-26.b24.1-mdv2011.0.i586.rpm
 bda2c5ac1774f53e1af11b63a7f4e8e1  2011/i586/java-1.6.0-openjdk-src-1.6.0.0-26.b24.1-mdv2011.0.i586.rpm 
 277b3fbf68229aa5249e0999db11bc3b  2011/SRPMS/java-1.6.0-openjdk-1.6.0.0-26.b24.1.src.rpm

 Mandriva Linux 2011/X86_64:
 3606504a3516077390012c0e64278bce  2011/x86_64/java-1.6.0-openjdk-1.6.0.0-26.b24.1-mdv2011.0.x86_64.rpm
 bd19f0742c1eada1d422d2a8975e0acb  2011/x86_64/java-1.6.0-openjdk-demo-1.6.0.0-26.b24.1-mdv2011.0.x86_64.rpm
 2ec9e7b37105839c19ea7b934b22cd41  2011/x86_64/java-1.6.0-openjdk-devel-1.6.0.0-26.b24.1-mdv2011.0.x86_64.rpm
 41896f4d4504752dbe13ab2867848170  2011/x86_64/java-1.6.0-openjdk-javadoc-1.6.0.0-26.b24.1-mdv2011.0.x86_64.rpm
 757e1cf60cadbaf7b43ae5fe20528adf  2011/x86_64/java-1.6.0-openjdk-src-1.6.0.0-26.b24.1-mdv2011.0.x86_64.rpm 
 277b3fbf68229aa5249e0999db11bc3b  2011/SRPMS/java-1.6.0-openjdk-1.6.0.0-26.b24.1.src.rpm

 Mandriva Enterprise Server 5:
 9c6e06dd8ed1f926081a57ee24b64b5e  mes5/i586/java-1.6.0-openjdk-1.6.0.0-26.b24.1mdvmes5.2.i586.rpm
 689ce76c039dfbf9d31748598521b017  mes5/i586/java-1.6.0-openjdk-demo-1.6.0.0-26.b24.1mdvmes5.2.i586.rpm
 a83f0b6fdaa03bcfdd65ea23dffb5cc4  mes5/i586/java-1.6.0-openjdk-devel-1.6.0.0-26.b24.1mdvmes5.2.i586.rpm
 47aee7abb00eb28444dce0e325202334  mes5/i586/java-1.6.0-openjdk-javadoc-1.6.0.0-26.b24.1mdvmes5.2.i586.rpm
 bd254da4559a4e483d8fdc7e6bbe4c6e  mes5/i586/java-1.6.0-openjdk-src-1.6.0.0-26.b24.1mdvmes5.2.i586.rpm 
 97288c2f2e19934685153c58d3381cde  mes5/SRPMS/java-1.6.0-openjdk-1.6.0.0-26.b24.1mdvmes5.2.src.rpm

 Mandriva Enterprise Server 5/X86_64:
 56fb8ac45e0f0e6dc06abf6171251ba1  mes5/x86_64/java-1.6.0-openjdk-1.6.0.0-26.b24.1mdvmes5.2.x86_64.rpm
 15617fcd73aa5b2f704327c3ee0f3db7  mes5/x86_64/java-1.6.0-openjdk-demo-1.6.0.0-26.b24.1mdvmes5.2.x86_64.rpm
 244d6a8e07afcd5817447694860880c1  mes5/x86_64/java-1.6.0-openjdk-devel-1.6.0.0-26.b24.1mdvmes5.2.x86_64.rpm
 7da7f73665cc6661a0216bd010e7afe2  mes5/x86_64/java-1.6.0-openjdk-javadoc-1.6.0.0-26.b24.1mdvmes5.2.x86_64.rpm
 4159505d3b9ae04c0a24ed7ff5d0d6ea  mes5/x86_64/java-1.6.0-openjdk-src-1.6.0.0-26.b24.1mdvmes5.2.x86_64.rpm 
 97288c2f2e19934685153c58d3381cde  mes5/SRPMS/java-1.6.0-openjdk-1.6.0.0-26.b24.1mdvmes5.2.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iD8DBQFP3v0dmqjQ0CJFipgRApUEAKDuHyqURe7mAlzYzLRgK4SCCjmaxACgqxmR
y5zs168WwioVV48Wj1lIeDQ=
=9Eet
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ