[ubuntu/lucid-security] openjdk-6b18 6b18-1.8.10-0ubuntu1~10.04.2 (Accepted)
Steve Beattie
sbeattie at ubuntu.com
Wed Nov 16 00:12:41 UTC 2011
openjdk-6b18 (6b18-1.8.10-0ubuntu1~10.04.2) lucid-security; urgency=low
* SECURITY UPDATE: Same Origin Policy (SOP) bypass flaw
- debian/patches/SOP-bypass-icedtea6-1.8.patch: Remove special
case for SocketPermission.
- CVE-2011-3377
- Applied inline due to needing to apply patches only once for netx,
not for every vm
openjdk-6b18 (6b18-1.8.10-0ubuntu1~10.04.1) lucid-security; urgency=low
* SECURITY UPDATE: IcedTea6 1.8.10 release (LP: #878684)
- security fixes:
- S7000600, CVE-2011-3547: InputStream skip() information leak
- S7019773, CVE-2011-3548: mutable static AWTKeyStroke.ctor
- S7023640, CVE-2011-3551: Java2D TransformHelper integer
overflow
- S7032417, CVE-2011-3552: excessive default UDP socket limit
under SecurityManager
- S7046794, CVE-2011-3553: JAX-WS stack-traces information leak
- S7046823, CVE-2011-3544: missing SecurityManager checks in
scripting engine
- S7055902, CVE-2011-3521: IIOP deserialization code execution
- S7057857, CVE-2011-3554: insufficient pack200 JAR files
uncompress error checks
- S7064341, CVE-2011-3389: HTTPS: block-wise chosen-plaintext
attack against SSL/TLS (BEAST)
- S7077466, CVE-2011-3556: RMI DGC server remote code execution
- S7083012, CVE-2011-3557: RMI registry privileged code execution
- S7096936, CVE-2011-3560: missing checkSetFactory calls in
HttpsURLConnection
- unapplied previous updates inline changes as they were
incorporated upstream; remaining changes in Makefile.{in,am} and
ports/hotspot/make/linux/makefiles/zeroshark.make
Date: Tue, 08 Nov 2011 14:08:52 -0800
Changed-By: Steve Beattie <sbeattie at ubuntu.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
https://launchpad.net/ubuntu/lucid/+source/openjdk-6b18/6b18-1.8.10-0ubuntu1~10.04.2
-------------- next part --------------
Format: 1.8
Date: Tue, 08 Nov 2011 14:08:52 -0800
Source: openjdk-6b18
Binary: openjdk-6-jdk openjdk-6-jre-headless openjdk-6-jre openjdk-6-demo openjdk-6-dbg icedtea6-plugin icedtea-6-jre-cacao openjdk-6-jre-zero
Architecture: source
Version: 6b18-1.8.10-0ubuntu1~10.04.2
Distribution: lucid-security
Urgency: low
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Steve Beattie <sbeattie at ubuntu.com>
Description:
icedtea-6-jre-cacao - Alternative JVM for OpenJDK, using Cacao
icedtea6-plugin - web browser plugin based on OpenJDK and IcedTea to execute Java a
openjdk-6-dbg - Java runtime based on OpenJDK (debugging symbols)
openjdk-6-demo - Java runtime based on OpenJDK (demos and examples)
openjdk-6-jdk - OpenJDK Development Kit (JDK)
openjdk-6-jre - OpenJDK Java runtime, using ${vm:Name}
openjdk-6-jre-headless - OpenJDK Java runtime, using ${vm:Name} (headless)
openjdk-6-jre-zero - Alternative JVM for OpenJDK, using Zero/Shark
Launchpad-Bugs-Fixed: 878684
Changes:
openjdk-6b18 (6b18-1.8.10-0ubuntu1~10.04.2) lucid-security; urgency=low
.
* SECURITY UPDATE: Same Origin Policy (SOP) bypass flaw
- debian/patches/SOP-bypass-icedtea6-1.8.patch: Remove special
case for SocketPermission.
- CVE-2011-3377
- Applied inline due to needing to apply patches only once for netx,
not for every vm
.
openjdk-6b18 (6b18-1.8.10-0ubuntu1~10.04.1) lucid-security; urgency=low
.
* SECURITY UPDATE: IcedTea6 1.8.10 release (LP: #878684)
- security fixes:
- S7000600, CVE-2011-3547: InputStream skip() information leak
- S7019773, CVE-2011-3548: mutable static AWTKeyStroke.ctor
- S7023640, CVE-2011-3551: Java2D TransformHelper integer
overflow
- S7032417, CVE-2011-3552: excessive default UDP socket limit
under SecurityManager
- S7046794, CVE-2011-3553: JAX-WS stack-traces information leak
- S7046823, CVE-2011-3544: missing SecurityManager checks in
scripting engine
- S7055902, CVE-2011-3521: IIOP deserialization code execution
- S7057857, CVE-2011-3554: insufficient pack200 JAR files
uncompress error checks
- S7064341, CVE-2011-3389: HTTPS: block-wise chosen-plaintext
attack against SSL/TLS (BEAST)
- S7077466, CVE-2011-3556: RMI DGC server remote code execution
- S7083012, CVE-2011-3557: RMI registry privileged code execution
- S7096936, CVE-2011-3560: missing checkSetFactory calls in
HttpsURLConnection
- unapplied previous updates inline changes as they were
incorporated upstream; remaining changes in Makefile.{in,am} and
ports/hotspot/make/linux/makefiles/zeroshark.make
Checksums-Sha1:
9d12661f9e6616c42af82a8f39ef93c5eb99ffc3 3148 openjdk-6b18_6b18-1.8.10-0ubuntu1~10.04.2.dsc
9238d670c5a5f0aa2b387ddec312c0ac6b3771f7 138725 openjdk-6b18_6b18-1.8.10-0ubuntu1~10.04.2.diff.gz
Checksums-Sha256:
1c6f2833be0872685569af94949aa7aef5273f38d15b8d03d4d5a01e00312b5a 3148 openjdk-6b18_6b18-1.8.10-0ubuntu1~10.04.2.dsc
465e979473406576d601c984a27f25c19fdaa3139caaf538536704cc1f4b4763 138725 openjdk-6b18_6b18-1.8.10-0ubuntu1~10.04.2.diff.gz
Files:
b88ac51af6b1b7b1e8bb3326cf1a7cde 3148 java optional openjdk-6b18_6b18-1.8.10-0ubuntu1~10.04.2.dsc
03f1389eae08d0c0737b5f189eaac36a 138725 java optional openjdk-6b18_6b18-1.8.10-0ubuntu1~10.04.2.diff.gz
Original-Maintainer: OpenJDK Team <openjdk at lists.launchpad.net>
More information about the Lucid-changes
mailing list