SCIENTIFIC-LINUX-ERRATA Archives

July 2014

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Pat Riehecky <[log in to unmask]>
Reply To:
Date:
Mon, 21 Jul 2014 19:30:48 +0000
Content-Type:
text/plain
Parts/Attachments:
text/plain (98 lines)
Synopsis:          Important: java-1.6.0-openjdk security and bug fix update
Advisory ID:       SLSA-2014:0907-1
Issue Date:        2014-07-21
CVE Numbers:       CVE-2014-4262
                   CVE-2014-4244
                   CVE-2014-4263
                   CVE-2014-4219
                   CVE-2014-2490
                   CVE-2014-4216
                   CVE-2014-4209
                   CVE-2014-4218
                   CVE-2014-4252
                   CVE-2014-4266
--

It was discovered that the Hotspot component in OpenJDK did not properly
verify bytecode from the class files. An untrusted Java application or
applet could possibly use these flaws to bypass Java sandbox restrictions.
(CVE-2014-4216, CVE-2014-4219)

A format string flaw was discovered in the Hotspot component event logger
in OpenJDK. An untrusted Java application or applet could use this flaw to
crash the Java Virtual Machine or, potentially, execute arbitrary code
with the privileges of the Java Virtual Machine. (CVE-2014-2490)

An improper permission check issue was discovered in the Libraries
component in OpenJDK. An untrusted Java application or applet could use
this flaw to bypass Java sandbox restrictions. (CVE-2014-4262)

Multiple flaws were discovered in the JMX, Libraries, Security, and
Serviceability components in OpenJDK. An untrusted Java application or
applet could use these flaws to bypass certain Java sandbox restrictions.
(CVE-2014-4209, CVE-2014-4218, CVE-2014-4252, CVE-2014-4266)

It was discovered that the RSA algorithm in the Security component in
OpenJDK did not sufficiently perform blinding while performing operations
that were using private keys. An attacker able to measure timing
differences of those operations could possibly leak information about the
used keys. (CVE-2014-4244)

The Diffie-Hellman (DH) key exchange algorithm implementation in the
Security component in OpenJDK failed to validate public DH parameters
properly. This could cause OpenJDK to accept and use weak parameters,
allowing an attacker to recover the negotiated key. (CVE-2014-4263)

This update also fixes the following bug:

* Prior to this update, an application accessing an unsynchronized HashMap
could potentially enter an infinite loop and consume an excessive amount
of CPU resources. This update resolves this issue.

All running instances of OpenJDK Java must be restarted for the update to
take effect.
--

SL5
  x86_64
    java-1.6.0-openjdk-src-1.6.0.0-6.1.13.4.el5_10.x86_64.rpm
    java-1.6.0-openjdk-devel-1.6.0.0-6.1.13.4.el5_10.x86_64.rpm
    java-1.6.0-openjdk-javadoc-1.6.0.0-6.1.13.4.el5_10.x86_64.rpm
    java-1.6.0-openjdk-demo-1.6.0.0-6.1.13.4.el5_10.x86_64.rpm
    java-1.6.0-openjdk-1.6.0.0-6.1.13.4.el5_10.x86_64.rpm
    java-1.6.0-openjdk-debuginfo-1.6.0.0-6.1.13.4.el5_10.x86_64.rpm
  i386
    java-1.6.0-openjdk-demo-1.6.0.0-6.1.13.4.el5_10.i386.rpm
    java-1.6.0-openjdk-1.6.0.0-6.1.13.4.el5_10.i386.rpm
    java-1.6.0-openjdk-devel-1.6.0.0-6.1.13.4.el5_10.i386.rpm
    java-1.6.0-openjdk-src-1.6.0.0-6.1.13.4.el5_10.i386.rpm
    java-1.6.0-openjdk-javadoc-1.6.0.0-6.1.13.4.el5_10.i386.rpm
    java-1.6.0-openjdk-debuginfo-1.6.0.0-6.1.13.4.el5_10.i386.rpm
  srpm
    java-1.6.0-openjdk-1.6.0.0-6.1.13.4.el5_10.src.rpm
  noarch
    java-1.6.0-openjdk-debuginfo-1.6.0.0-6.1.13.4.el5_10.x86_64.rpm
    java-1.6.0-openjdk-debuginfo-1.6.0.0-6.1.13.4.el5_10.i386.rpm
SL6
  x86_64
    java-1.6.0-openjdk-demo-1.6.0.0-6.1.13.4.el6_5.x86_64.rpm
    java-1.6.0-openjdk-1.6.0.0-6.1.13.4.el6_5.x86_64.rpm
    java-1.6.0-openjdk-devel-1.6.0.0-6.1.13.4.el6_5.x86_64.rpm
    java-1.6.0-openjdk-javadoc-1.6.0.0-6.1.13.4.el6_5.x86_64.rpm
    java-1.6.0-openjdk-src-1.6.0.0-6.1.13.4.el6_5.x86_64.rpm
    java-1.6.0-openjdk-debuginfo-1.6.0.0-6.1.13.4.el6_5.x86_64.rpm
  srpm
    java-1.6.0-openjdk-1.6.0.0-6.1.13.4.el6_5.src.rpm
  i386
    java-1.6.0-openjdk-devel-1.6.0.0-6.1.13.4.el6_5.i686.rpm
    java-1.6.0-openjdk-demo-1.6.0.0-6.1.13.4.el6_5.i686.rpm
    java-1.6.0-openjdk-1.6.0.0-6.1.13.4.el6_5.i686.rpm
    java-1.6.0-openjdk-javadoc-1.6.0.0-6.1.13.4.el6_5.i686.rpm
    java-1.6.0-openjdk-src-1.6.0.0-6.1.13.4.el6_5.i686.rpm
    java-1.6.0-openjdk-debuginfo-1.6.0.0-6.1.13.4.el6_5.i686.rpm
  noarch
    java-1.6.0-openjdk-debuginfo-1.6.0.0-6.1.13.4.el6_5.x86_64.rpm
    java-1.6.0-openjdk-debuginfo-1.6.0.0-6.1.13.4.el6_5.i686.rpm

- Scientific Linux Development Team

ATOM RSS1 RSS2