Debian: DSA-2224-1: openjdk-6 security update

    Date20 Apr 2011
    CategoryDebian
    41
    Posted ByLinuxSecurity Advisories
    Several security vulnerabilities were discovered in OpenJDK, an implementation of the Java platform. CVE-2010-4351
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    - -------------------------------------------------------------------------
    Debian Security Advisory DSA-2224-1                   This email address is being protected from spambots. You need JavaScript enabled to view it.
    http://www.debian.org/security/                            Florian Weimer
    April 20, 2011                         http://www.debian.org/security/faq
    - -------------------------------------------------------------------------
    
    Package        : openjdk-6
    Vulnerability  : several
    Problem type   : remote
    Debian-specific: no
    CVE ID         : CVE-2010-4351 CVE-2010-4448 CVE-2010-4450 CVE-2010-4465 
                     CVE-2010-4469 CVE-2010-4470 CVE-2010-4471 CVE-2010-4472
                     CVE-2011-0025 CVE-2011-0706
    
    Several security vulnerabilities were discovered in OpenJDK, an
    implementation of the Java platform.
    
    CVE-2010-4351
        The JNLP SecurityManager returns from the checkPermission method
        instead of throwing an exception in certain circumstances, which
        might allow context-dependent attackers to bypass the intended
        security policy by creating instances of ClassLoader.
    
    CVE-2010-4448
        Malicious applets can perform DNS cache poisoning.
    
    CVE-2010-4450
        An empty (but set) LD_LIBRARY_PATH environment variable results in
        a misconstructed library search path, resulting in code execution
        from possibly untrusted sources.
    
    CVE-2010-4465
        Malicious applets can extend their privileges by abusing Swing
        timers.
    
    CVE-2010-4469
        The Hotspot just-in-time compiler miscompiles crafted byte
        sequences, resulting in heap corruption.
    
    CVE-2010-4470
        JAXP can be exploited by untrusted code to elevate privileges.
    
    CVE-2010-4471
        Java2D can be exploited by untrusted code to elevate privileges.
    
    CVE-2010-4472
        Untrusted code can replace the XML DSIG implementation.
    
    CVE-2011-0025
        Signatures on JAR files are not properly verified, which allows
        remote attackers to trick users into executing code that appears
        to come from a trusted source.
    
    CVE-2011-0706
        The JNLPClassLoader class allows remote attackers to gain
        privileges via unknown vectors related to multiple signers and the
        assignment of "an inappropriate security descriptor
    
    In addition, this security update contains stability fixes, such as
    switching to the recommended Hotspot version (hs14) for this
    particular version of OpenJDK.
    
    For the oldstable distribution (lenny), these problems have been fixed in
    version 6b18-1.8.7-2~lenny1.
    
    For the stable distribution (squeeze), these problems have been fixed in
    version 6b18-1.8.7-2~squeeze1.
    
    For the testing distribution (wheezy) and the unstable distribution
    (sid), these problems have been fixed in version 1.8.7-1.
    
    We recommend that you upgrade your openjdk-6 packages.
    
    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: http://www.debian.org/security/
    
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"5","type":"x","order":"1","pct":55.56,"resources":[]},{"id":"88","title":"Should be more technical","votes":"3","type":"x","order":"2","pct":33.33,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"1","type":"x","order":"3","pct":11.11,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.