Linux Security
    Linux Security
    Linux Security

    Debian: DSA-2224-1: openjdk-6 security update

    Date
    214
    Posted By
    Several security vulnerabilities were discovered in OpenJDK, an implementation of the Java platform. CVE-2010-4351
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    - -------------------------------------------------------------------------
    Debian Security Advisory DSA-2224-1                   This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://www.debian.org/security/                            Florian Weimer
    April 20, 2011                         https://www.debian.org/security/faq
    - -------------------------------------------------------------------------
    
    Package        : openjdk-6
    Vulnerability  : several
    Problem type   : remote
    Debian-specific: no
    CVE ID         : CVE-2010-4351 CVE-2010-4448 CVE-2010-4450 CVE-2010-4465 
                     CVE-2010-4469 CVE-2010-4470 CVE-2010-4471 CVE-2010-4472
                     CVE-2011-0025 CVE-2011-0706
    
    Several security vulnerabilities were discovered in OpenJDK, an
    implementation of the Java platform.
    
    CVE-2010-4351
        The JNLP SecurityManager returns from the checkPermission method
        instead of throwing an exception in certain circumstances, which
        might allow context-dependent attackers to bypass the intended
        security policy by creating instances of ClassLoader.
    
    CVE-2010-4448
        Malicious applets can perform DNS cache poisoning.
    
    CVE-2010-4450
        An empty (but set) LD_LIBRARY_PATH environment variable results in
        a misconstructed library search path, resulting in code execution
        from possibly untrusted sources.
    
    CVE-2010-4465
        Malicious applets can extend their privileges by abusing Swing
        timers.
    
    CVE-2010-4469
        The Hotspot just-in-time compiler miscompiles crafted byte
        sequences, resulting in heap corruption.
    
    CVE-2010-4470
        JAXP can be exploited by untrusted code to elevate privileges.
    
    CVE-2010-4471
        Java2D can be exploited by untrusted code to elevate privileges.
    
    CVE-2010-4472
        Untrusted code can replace the XML DSIG implementation.
    
    CVE-2011-0025
        Signatures on JAR files are not properly verified, which allows
        remote attackers to trick users into executing code that appears
        to come from a trusted source.
    
    CVE-2011-0706
        The JNLPClassLoader class allows remote attackers to gain
        privileges via unknown vectors related to multiple signers and the
        assignment of "an inappropriate security descriptor
    
    In addition, this security update contains stability fixes, such as
    switching to the recommended Hotspot version (hs14) for this
    particular version of OpenJDK.
    
    For the oldstable distribution (lenny), these problems have been fixed in
    version 6b18-1.8.7-2~lenny1.
    
    For the stable distribution (squeeze), these problems have been fixed in
    version 6b18-1.8.7-2~squeeze1.
    
    For the testing distribution (wheezy) and the unstable distribution
    (sid), these problems have been fixed in version 1.8.7-1.
    
    We recommend that you upgrade your openjdk-6 packages.
    
    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: https://www.debian.org/security/
    
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    

    LinuxSecurity Poll

    Tails is the most secure Linux distro out there.

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    /main-polls/41-ubuntu-is-a-more-secure-distro-than-fedora?task=poll.vote&format=json
    41
    radio
    [{"id":"142","title":"Yes - Tails get my vote!","votes":"2","type":"x","order":"1","pct":100,"resources":[]},{"id":"143","title":"Nope - Parrot OS has surpassed Tails in its security and privacy.","votes":"0","type":"x","order":"2","pct":0,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350


    VIEW MORE POLLS

    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.