|
Bugzilla – Full Text Bug Listing |
| Summary: | VUL-0: openjdk: multiple security issues | ||
|---|---|---|---|
| Product: | [openSUSE] openSUSE 11.1 | Reporter: | Matthias Weckbecker <mweckbecker> |
| Component: | Java | Assignee: | Security Team bot <security-team> |
| Status: | RESOLVED FIXED | QA Contact: | E-mail List <qa-bugs> |
| Severity: | Major | ||
| Priority: | P2 - High | CC: | security-team, wolfgang |
| Version: | Final | ||
| Target Milestone: | Future/Later | ||
| Hardware: | Other | ||
| OS: | Other | ||
| Whiteboard: | . CVSSv2:NVD:CVE-2010-0837:7.5:(AV:N/AC:L/Au:N/C:P/I:P/A:P) CVSSv2:RedHat:CVE-2010-0837:7.5:(AV:N/AC:L/Au:N/C:P/I:P/A:P) | ||
| Found By: | Other | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
| Bug Depends on: | |||
| Bug Blocks: | 601243, 624057 | ||
| Deadline: | 2010-08-24 | ||
|
Description
Matthias Weckbecker
2010-07-20 14:49:02 UTC
- (CVE-2010-0837): JAR "unpack200" must verify input parameters (6902299) - (CVE-2010-0845): No ClassCastException for HashAttributeSet constructors if run with -Xcomp (6894807) - (CVE-2010-0838): CMM readMabCurveData Buffer Overflow Vulnerability (6899653) - (CVE-2010-0082): Loader-constraint table allows arrays instead of only the base-classes (6626217) - (CVE-2010-0095): Subclasses of InetAddress may incorrectly interpret network addresses (6893954) - (CVE-2010-0085): File TOCTOU deserialization vulnerability (6736390) - (CVE-2010-0091): Unsigned applet can retrieve the dragged information before drop action occurs (6887703) - (CVE-2010-0088): Inflater/Deflater clone issues (6745393) - (CVE-2010-0084): Policy/PolicyFile leak dynamic ProtectionDomains. (6633872) - (CVE-2010-0092): AtomicReferenceArray causes SIGSEGV -> SEGV_MAPERR error (6888149) - (CVE-2010-0094): Deserialization of RMIConnectionImpl objects should enforce stricter checks (6893947) - (CVE-2010-0093): System.arraycopy unable to reference elements beyond Integer.MAX_VALUE bytes (6892265) - (CVE-2010-0840): Applet Trusted Methods Chaining Privilege Escalation Vulnerability (6904691) - (CVE-2010-0848): AWT Library Invalid Index Vulnerability (6914823) - (CVE-2010-0847): ImagingLib arbitrary code execution vulnerability (6914866) - (CVE-2009-3555): TLS: MITM attacks via session renegotiation - 6639665: ThreadGroup finalizer allows creation of false root ThreadGroups - 6898622: ObjectIdentifer.equals is not capable of detecting incorrectly encoded CommonName OIDs - 6910590: Application can modify command array in ProcessBuilder - 6909597: JPEGImageReader stepX Integer Overflow Vulnerability - 6932480: Crash in CompilerThread/Parser. Unloaded array klass? Submitted to: head - 44266 11.3 - 44263 11.2 - 44265 11.1 - 44264 Move this bug to openSUSE 11.1 to make it public. JFI: the http://blog.fuseyism.com/index.php/2010/07/28/icedtea6-181-released/ refers to the two CVEs in 1.8.1 # CVE-2010-2783, RH616895: IcedTea ‘Extended JNLP Services’ arbitrary file access # CVE-2010-2548, RH616893: IcedTea Incomplete property access check for unsigned applications The link in comment#0 and therefore the cve list in comment#1 are bogus. They refer to icedtea 1.7.2. We are talking about a version update to icedtea 1.8.1 as noted in comment#4 here. The SWAMPID for this issue is 35073. This issue was rated as moderate. Please submit fixed packages until 2010-08-24. When done, please reassign the bug to security-team@suse.de. Patchinfo will be handled by security team. (In reply to comment #7) > The link in comment#0 and therefore the cve list in comment#1 are bogus. They > refer to icedtea 1.7.2. We are talking about a version update to icedtea 1.8.1 > as noted in comment#4 here. Ludwig, comment#0 and comment#1 refers to the icedtea6-1.8.0, so they are valid! If you visit the attachment [1] of the announcement [2] email from comment#0, you find a lot of icedtea6-1.8 strings. So list of CVEs in comment#1 is valid for this update too. [1] http://mail.openjdk.java.net/pipermail/distro-pkg-dev/attachments/20100414/58d9f1ef/attachment-0001.txt [2] http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2010-April/008950.html we claim to have fixed those cve numbers in the previous update already though. So we can hardly release another update that fixes the same cves again. Hi Ludwig, you're right, the 1.8.0 release contains the same fixes as 1.7.2 we already released. So the valid list is only CVEs from comment#4 Update released for: java-1_6_0-openjdk, java-1_6_0-openjdk-debuginfo, java-1_6_0-openjdk-debugsource, java-1_6_0-openjdk-demo, java-1_6_0-openjdk-demo-debuginfo, java-1_6_0-openjdk-devel, java-1_6_0-openjdk-devel-debuginfo, java-1_6_0-openjdk-javadoc, java-1_6_0-openjdk-plugin, java-1_6_0-openjdk-plugin-debuginfo, java-1_6_0-openjdk-src Products: openSUSE 11.1 (debug, i586, ppc, x86_64) openSUSE 11.2 (debug, i586, x86_64) openSUSE 11.3 (debug, i586, x86_64) released This is an autogenerated message for OBS integration: This bug (623905) was mentioned in https://build.opensuse.org/request/show/44263 11.3:Test / java-1_6_0-openjdk https://build.opensuse.org/request/show/44264 11.1 / java-1_6_0-openjdk https://build.opensuse.org/request/show/44265 11.2:Test / java-1_6_0-openjdk https://build.opensuse.org/request/show/44266 Factory / java-1_6_0-openjdk |