Paketname
java-1.6.0-openjdk
Datum
2009-07-28
Advisory ID
MDVSA-2009:162
Betroffene Versionen
MES5 i586 , MES5 x86_64

Problembeschreibung

Multiple security vulnerabilities has been identified and fixed in
Little cms library embedded in OpenJDK:

A memory leak flaw allows remote attackers to cause a denial of service
(memory consumption and application crash) via a crafted image file
(CVE-2009-0581).

Multiple integer overflows allow remote attackers to execute arbitrary
code via a crafted image file that triggers a heap-based buffer
overflow (CVE-2009-0723).

Multiple stack-based buffer overflows allow remote attackers to
execute arbitrary code via a crafted image file associated with a large
integer value for the (1) input or (2) output channel (CVE-2009-0733).

A flaw in the transformations of monochrome profiles allows remote
attackers to cause denial of service triggered by a NULL pointer
dereference via a crafted image file (CVE-2009-0793).

Further security fixes in the JRE and in the Java API of OpenJDK:

A flaw in handling temporary font files by the Java Virtual
Machine (JVM) allows remote attackers to cause denial of service
(CVE-2006-2426).

An integer overflow flaw was found in Pulse-Java when handling Pulse
audio source data lines. An attacker could use this flaw to cause an
applet to crash, leading to a denial of service (CVE-2009-0794).

A flaw in Java Runtime Environment initialized LDAP connections
allows authenticated remote users to cause denial of service on the
LDAP service (CVE-2009-1093).

A flaw in the Java Runtime Environment LDAP client in handling server
LDAP responses allows remote attackers to execute arbitrary code on
the client side via malicious server response (CVE-2009-1094).

Buffer overflows in the the Java Runtime Environment unpack200 utility
allow remote attackers to execute arbitrary code via an crafted applet
(CVE-2009-1095, CVE-2009-1096).

A buffer overflow in the splash screen processing allows a attackers
to execute arbitrary code (CVE-2009-1097).

A buffer overflow in GIF images handling allows remote attackers to
execute arbitrary code via an crafted GIF image (CVE-2009-1098).

A flaw in the Java API for XML Web Services (JAX-WS) service endpoint
handling allows remote attackers to cause a denial of service on the
service endpoint's server side (CVE-2009-1101).

A flaw in the Java Runtime Environment Virtual Machine code generation
allows remote attackers to execute arbitrary code via a crafted applet
(CVE-2009-1102).

This update provides fixes for these issues.

Aktualisierte Pakete

MES5 i586

 f6368a18b2b8db81a7469b5135b7ee06  mes5/i586/java-1.6.0-openjdk-1.6.0.0-0.20.b16.0.3mdvmes5.i586.rpm
 f2be106ac66e9a50f4ba74cbefda770c  mes5/i586/java-1.6.0-openjdk-demo-1.6.0.0-0.20.b16.0.3mdvmes5.i586.rpm
 31a5ec29a095406a456704102f0fcfed  mes5/i586/java-1.6.0-openjdk-devel-1.6.0.0-0.20.b16.0.3mdvmes5.i586.rpm
 1f1344246611ade062f5cff22248a85c  mes5/i586/java-1.6.0-openjdk-javadoc-1.6.0.0-0.20.b16.0.3mdvmes5.i586.rpm
 df7a7fe90e1574841ef4e9c54dbc1b03  mes5/i586/java-1.6.0-openjdk-plugin-1.6.0.0-0.20.b16.0.3mdvmes5.i586.rpm
 4f58dd3aede5767fe67b3615b005dae4  mes5/i586/java-1.6.0-openjdk-src-1.6.0.0-0.20.b16.0.3mdvmes5.i586.rpm
 238d40b950f5c91ece2011cd11493d7b  mes5/i586/rhino-1.7-0.0.2.2mdvmes5.noarch.rpm
 2628511efa4e84a9990d251b640d26fd  mes5/i586/rhino-demo-1.7-0.0.2.2mdvmes5.noarch.rpm
 223618bbd67a5b5ce0cbba2ee4d1fb35  mes5/i586/rhino-javadoc-1.7-0.0.2.2mdvmes5.noarch.rpm
 938b06b42a87c8c4b7db51f8af099c28  mes5/i586/rhino-manual-1.7-0.0.2.2mdvmes5.noarch.rpm 
 4011be2c0535783dfea04a5adfce1793  mes5/SRPMS/java-1.6.0-openjdk-1.6.0.0-0.20.b16.0.3mdvmes5.src.rpm
 0445ae120c5dbe9957abe9fdffc1d1dd  mes5/SRPMS/rhino-1.7-0.0.2.2mdvmes5.src.rpm

MES5 x86_64

 554fa4e2c062e43110dd91613f08469a  mes5/x86_64/java-1.6.0-openjdk-1.6.0.0-0.20.b16.0.3mdvmes5.x86_64.rpm
 731b4477a5869c4f2bdf3f420c3fd20b  mes5/x86_64/java-1.6.0-openjdk-demo-1.6.0.0-0.20.b16.0.3mdvmes5.x86_64.rpm
 822b29df6b3a147eadc76d2bb3f40048  mes5/x86_64/java-1.6.0-openjdk-devel-1.6.0.0-0.20.b16.0.3mdvmes5.x86_64.rpm
 dac9bcbc35102d93478a161b29c37ecd  mes5/x86_64/java-1.6.0-openjdk-javadoc-1.6.0.0-0.20.b16.0.3mdvmes5.x86_64.rpm
 39f26bcda91670cbf8acd7594cb0f805  mes5/x86_64/java-1.6.0-openjdk-plugin-1.6.0.0-0.20.b16.0.3mdvmes5.x86_64.rpm
 c075fd8bb1e7dcb55aacaa1a2ba509f2  mes5/x86_64/java-1.6.0-openjdk-src-1.6.0.0-0.20.b16.0.3mdvmes5.x86_64.rpm
 7ca12525266382ff80ff8779214d91bd  mes5/x86_64/rhino-1.7-0.0.2.2mdvmes5.noarch.rpm
 2f96a78708288e93baa3c117e74a5b20  mes5/x86_64/rhino-demo-1.7-0.0.2.2mdvmes5.noarch.rpm
 7d149643cd8be8af15bbfc538c7a2c42  mes5/x86_64/rhino-javadoc-1.7-0.0.2.2mdvmes5.noarch.rpm
 66102c3e6e500fad7e4180b429245428  mes5/x86_64/rhino-manual-1.7-0.0.2.2mdvmes5.noarch.rpm 
 4011be2c0535783dfea04a5adfce1793  mes5/SRPMS/java-1.6.0-openjdk-1.6.0.0-0.20.b16.0.3mdvmes5.src.rpm
 0445ae120c5dbe9957abe9fdffc1d1dd  mes5/SRPMS/rhino-1.7-0.0.2.2mdvmes5.src.rpm

Referenzen