MGASA-2013-0062
Date: | February 21st, 2013 |
Affected releases: | 2 |
Media: | Core |
Description:
Updated java-1.6.0-openjdk packages fix security vulnerabilities:
An improper permission check issue was discovered in the JMX component in
OpenJDK. An untrusted Java application or applet could use this flaw to
bypass Java sandbox restrictions (CVE-2013-1486).
It was discovered that OpenJDK leaked timing information when decrypting
TLS/SSL protocol encrypted records when CBC-mode cipher suites were used.
A remote attacker could possibly use this flaw to retrieve plain text from
the encrypted packets by using a TLS/SSL server as a padding oracle
(CVE-2013-0169).
This updates IcedTea6 to version 1.11.8, which fixes these and other
issues.
Updated Packages:
i586:
java-1.6.0-openjdk-1.6.0.0-38.b24.1.mga2.i586.rpm
java-1.6.0-openjdk-demo-1.6.0.0-38.b24.1.mga2.i586.rpm
java-1.6.0-openjdk-devel-1.6.0.0-38.b24.1.mga2.i586.rpm
java-1.6.0-openjdk-javadoc-1.6.0.0-38.b24.1.mga2.noarch.rpm
java-1.6.0-openjdk-src-1.6.0.0-38.b24.1.mga2.noarch.rpm
java-1.6.0-openjdk-debug-1.6.0.0-38.b24.1.mga2.i586.rpm
x86_64:
java-1.6.0-openjdk-1.6.0.0-38.b24.1.mga2.x86_64.rpm
java-1.6.0-openjdk-demo-1.6.0.0-38.b24.1.mga2.x86_64.rpm
java-1.6.0-openjdk-devel-1.6.0.0-38.b24.1.mga2.x86_64.rpm
java-1.6.0-openjdk-javadoc-1.6.0.0-38.b24.1.mga2.noarch.rpm
java-1.6.0-openjdk-src-1.6.0.0-38.b24.1.mga2.noarch.rpm
java-1.6.0-openjdk-debug-1.6.0.0-38.b24.1.mga2.x86_64.rpm
SRPMS:
java-1.6.0-openjdk-1.6.0.0-38.b24.1.mga2.src.rpm
References:
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0169
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1486
http://blog.fuseyism.com/index.php/2013/02/20/security-icedtea-1-11-8-1-12-3-for-openjdk-6-released/
https://rhn.redhat.com/errata/RHSA-2013-0273.html
https://bugs.mageia.org/show_bug.cgi?id=9140