SCIENTIFIC-LINUX-ERRATA Archives

July 2014

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Condense Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Content-Transfer-Encoding:
7bit
Sender:
Security Errata for Scientific Linux <[log in to unmask]>
Subject:
From:
Pat Riehecky <[log in to unmask]>
Date:
Wed, 16 Jul 2014 13:34:43 +0000
MIME-Version:
1.0
Content-Type:
text/plain; charset="utf-8"
Reply-To:
Parts/Attachments:
text/plain (76 lines)
Synopsis:          Critical: java-1.7.0-openjdk security update
Advisory ID:       SLSA-2014:0889-1
Issue Date:        2014-07-16
CVE Numbers:       CVE-2014-4262
                   CVE-2014-4244
                   CVE-2014-4263
                   CVE-2014-4221
                   CVE-2014-4219
                   CVE-2014-2490
                   CVE-2014-4216
                   CVE-2014-4223
                   CVE-2014-4209
                   CVE-2014-4218
                   CVE-2014-4252
                   CVE-2014-4266
                   CVE-2014-2483
--

It was discovered that the Hotspot component in OpenJDK did not properly
verify bytecode from the class files. An untrusted Java application or
applet could possibly use these flaws to bypass Java sandbox restrictions.
(CVE-2014-4216, CVE-2014-4219)

A format string flaw was discovered in the Hotspot component event logger
in OpenJDK. An untrusted Java application or applet could use this flaw to
crash the Java Virtual Machine or, potentially, execute arbitrary code
with the privileges of the Java Virtual Machine. (CVE-2014-2490)

Multiple improper permission check issues were discovered in the Libraries
component in OpenJDK. An untrusted Java application or applet could use
these flaws to bypass Java sandbox restrictions. (CVE-2014-4223,
CVE-2014-4262, CVE-2014-2483)

Multiple flaws were discovered in the JMX, Libraries, Security, and
Serviceability components in OpenJDK. An untrusted Java application or
applet could use these flaws to bypass certain Java sandbox restrictions.
(CVE-2014-4209, CVE-2014-4218, CVE-2014-4221, CVE-2014-4252,
CVE-2014-4266)

It was discovered that the RSA algorithm in the Security component in
OpenJDK did not sufficiently perform blinding while performing operations
that were using private keys. An attacker able to measure timing
differences of those operations could possibly leak information about the
used keys. (CVE-2014-4244)

The Diffie-Hellman (DH) key exchange algorithm implementation in the
Security component in OpenJDK failed to validate public DH parameters
properly. This could cause OpenJDK to accept and use weak parameters,
allowing an attacker to recover the negotiated key. (CVE-2014-4263)

Note: If the web browser plug-in provided by the icedtea-web package was
installed, the issues exposed via Java applets could have been exploited
without user interaction if a user visited a malicious website.

All running instances of OpenJDK Java must be restarted for the update to
take effect.
--

SL6
  x86_64
    java-1.7.0-openjdk-1.7.0.65-2.5.1.2.el6_5.x86_64.rpm
    java-1.7.0-openjdk-debuginfo-1.7.0.65-2.5.1.2.el6_5.x86_64.rpm
    java-1.7.0-openjdk-demo-1.7.0.65-2.5.1.2.el6_5.x86_64.rpm
    java-1.7.0-openjdk-devel-1.7.0.65-2.5.1.2.el6_5.x86_64.rpm
    java-1.7.0-openjdk-src-1.7.0.65-2.5.1.2.el6_5.x86_64.rpm
  i386
    java-1.7.0-openjdk-1.7.0.65-2.5.1.2.el6_5.i686.rpm
    java-1.7.0-openjdk-debuginfo-1.7.0.65-2.5.1.2.el6_5.i686.rpm
    java-1.7.0-openjdk-demo-1.7.0.65-2.5.1.2.el6_5.i686.rpm
    java-1.7.0-openjdk-devel-1.7.0.65-2.5.1.2.el6_5.i686.rpm
    java-1.7.0-openjdk-src-1.7.0.65-2.5.1.2.el6_5.i686.rpm
  noarch
    java-1.7.0-openjdk-javadoc-1.7.0.65-2.5.1.2.el6_5.noarch.rpm

- Scientific Linux Development Team

ATOM RSS1 RSS2