| From: |
| Mageia Updates <buildsystem-daemon@mageia.org> |
| To: |
| updates-announce@ml.mageia.org |
| Subject: |
| [updates-announce] MGASA-2013-0062:
java-1.6.0-openjdk-1.6.0.0-38.b24.1.mga2 (2/core) |
| Date: |
| Thu, 21 Feb 2013 22:11:17 +0100 |
| Message-ID: |
| <20130221211117.GA10559@valstar.mageia.org> |
| Archive-link: |
| Article, Thread
|
MGASA-2013-0062
Date: February 21st, 2013
Affected releases: 2
Media: Core
Description:
Updated java-1.6.0-openjdk packages fix security vulnerabilities:
An improper permission check issue was discovered in the JMX component in
OpenJDK. An untrusted Java application or applet could use this flaw to
bypass Java sandbox restrictions (CVE-2013-1486).
It was discovered that OpenJDK leaked timing information when decrypting
TLS/SSL protocol encrypted records when CBC-mode cipher suites were used.
A remote attacker could possibly use this flaw to retrieve plain text from
the encrypted packets by using a TLS/SSL server as a padding oracle
(CVE-2013-0169).
This updates IcedTea6 to version 1.11.8, which fixes these and other
issues.
Updated Packages:
i586:
java-1.6.0-openjdk-1.6.0.0-38.b24.1.mga2.i586.rpm
java-1.6.0-openjdk-demo-1.6.0.0-38.b24.1.mga2.i586.rpm
java-1.6.0-openjdk-devel-1.6.0.0-38.b24.1.mga2.i586.rpm
java-1.6.0-openjdk-javadoc-1.6.0.0-38.b24.1.mga2.noarch.rpm
java-1.6.0-openjdk-src-1.6.0.0-38.b24.1.mga2.noarch.rpm
java-1.6.0-openjdk-debug-1.6.0.0-38.b24.1.mga2.i586.rpm
x86_64:
java-1.6.0-openjdk-1.6.0.0-38.b24.1.mga2.x86_64.rpm
java-1.6.0-openjdk-demo-1.6.0.0-38.b24.1.mga2.x86_64.rpm
java-1.6.0-openjdk-devel-1.6.0.0-38.b24.1.mga2.x86_64.rpm
java-1.6.0-openjdk-javadoc-1.6.0.0-38.b24.1.mga2.noarch.rpm
java-1.6.0-openjdk-src-1.6.0.0-38.b24.1.mga2.noarch.rpm
java-1.6.0-openjdk-debug-1.6.0.0-38.b24.1.mga2.x86_64.rpm
SRPMS:
java-1.6.0-openjdk-1.6.0.0-38.b24.1.mga2.src.rpm
References:
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-201...
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-201...
http://blog.fuseyism.com/index.php/2013/02/20/security-ic...
https://rhn.redhat.com/errata/RHSA-2013-0273.html
https://bugs.mageia.org/show_bug.cgi?id=9140
https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-...
(
Log in to post comments)