SCIENTIFIC-LINUX-ERRATA Archives

January 2014

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Pat Riehecky <[log in to unmask]>
Reply To:
Date:
Mon, 27 Jan 2014 22:20:37 +0000
Content-Type:
text/plain
Parts/Attachments:
text/plain (82 lines)
Synopsis:          Important: java-1.6.0-openjdk security update
Advisory ID:       SLSA-2014:0097-1
Issue Date:        2014-01-27
CVE Numbers:       CVE-2014-0428
                   CVE-2014-0422
                   CVE-2014-0373
                   CVE-2013-5878
                   CVE-2013-5884
                   CVE-2014-0416
                   CVE-2014-0376
                   CVE-2013-5907
                   CVE-2014-0368
                   CVE-2013-5910
                   CVE-2014-0411
                   CVE-2014-0423
                   CVE-2013-5896
--

An input validation flaw was discovered in the font layout engine in the
2D component. A specially crafted font file could trigger a Java Virtual
Machine memory corruption when processed. An untrusted Java application or
applet could possibly use this flaw to bypass Java sandbox restrictions.
(CVE-2013-5907)

Multiple improper permission check issues were discovered in the CORBA and
JNDI components in OpenJDK. An untrusted Java application or applet could
use these flaws to bypass Java sandbox restrictions. (CVE-2014-0428,
CVE-2014-0422)

Multiple improper permission check issues were discovered in the
Serviceability, Security, CORBA, JAAS, JAXP, and Networking components in
OpenJDK. An untrusted Java application or applet could use these flaws to
bypass certain Java sandbox restrictions. (CVE-2014-0373, CVE-2013-5878,
CVE-2013-5910, CVE-2013-5896, CVE-2013-5884, CVE-2014-0416, CVE-2014-0376,
CVE-2014-0368)

It was discovered that the Beans component did not restrict processing of
XML external entities. This flaw could cause a Java application using
Beans to leak sensitive information, or affect application availability.
(CVE-2014-0423)

It was discovered that the JSSE component could leak timing information
during the TLS/SSL handshake. This could possibly lead to a disclosure of
information about the used encryption keys. (CVE-2014-0411)

All running instances of OpenJDK Java must be restarted for the update to
take effect.
--

SL5
  x86_64
    java-1.6.0-openjdk-1.6.0.0-3.1.13.1.el5_10.x86_64.rpm
    java-1.6.0-openjdk-debuginfo-1.6.0.0-3.1.13.1.el5_10.x86_64.rpm
    java-1.6.0-openjdk-demo-1.6.0.0-3.1.13.1.el5_10.x86_64.rpm
    java-1.6.0-openjdk-devel-1.6.0.0-3.1.13.1.el5_10.x86_64.rpm
    java-1.6.0-openjdk-javadoc-1.6.0.0-3.1.13.1.el5_10.x86_64.rpm
    java-1.6.0-openjdk-src-1.6.0.0-3.1.13.1.el5_10.x86_64.rpm
  i386
    java-1.6.0-openjdk-1.6.0.0-3.1.13.1.el5_10.i386.rpm
    java-1.6.0-openjdk-debuginfo-1.6.0.0-3.1.13.1.el5_10.i386.rpm
    java-1.6.0-openjdk-demo-1.6.0.0-3.1.13.1.el5_10.i386.rpm
    java-1.6.0-openjdk-devel-1.6.0.0-3.1.13.1.el5_10.i386.rpm
    java-1.6.0-openjdk-javadoc-1.6.0.0-3.1.13.1.el5_10.i386.rpm
    java-1.6.0-openjdk-src-1.6.0.0-3.1.13.1.el5_10.i386.rpm
SL6
  x86_64
    java-1.6.0-openjdk-1.6.0.0-3.1.13.1.el6_5.x86_64.rpm
    java-1.6.0-openjdk-debuginfo-1.6.0.0-3.1.13.1.el6_5.x86_64.rpm
    java-1.6.0-openjdk-demo-1.6.0.0-3.1.13.1.el6_5.x86_64.rpm
    java-1.6.0-openjdk-devel-1.6.0.0-3.1.13.1.el6_5.x86_64.rpm
    java-1.6.0-openjdk-javadoc-1.6.0.0-3.1.13.1.el6_5.x86_64.rpm
    java-1.6.0-openjdk-src-1.6.0.0-3.1.13.1.el6_5.x86_64.rpm
  i386
    java-1.6.0-openjdk-1.6.0.0-3.1.13.1.el6_5.i686.rpm
    java-1.6.0-openjdk-debuginfo-1.6.0.0-3.1.13.1.el6_5.i686.rpm
    java-1.6.0-openjdk-demo-1.6.0.0-3.1.13.1.el6_5.i686.rpm
    java-1.6.0-openjdk-devel-1.6.0.0-3.1.13.1.el6_5.i686.rpm
    java-1.6.0-openjdk-javadoc-1.6.0.0-3.1.13.1.el6_5.i686.rpm
    java-1.6.0-openjdk-src-1.6.0.0-3.1.13.1.el6_5.i686.rpm

- Scientific Linux Development Team

ATOM RSS1 RSS2