Описание
ELSA-2013-0751: java-1.7.0-openjdk security update (CRITICAL)
[1.7.0.19-2.3.9.1.0.1.el6_4]
- Update DISTRO_NAME in specfile
[1.7.0.19-2.3.9.1.el6]
- updated to updated IcedTea 2.3.9 with fix to one of security fixes
- fixed font glyph offset
- Resolves: rhbz#950380
[1.7.0.9-2.3.9.0.el6]
- updated to IcedTea 2.3.9 with latest security patches
- buildver sync to b19
- rewritten java-1.7.0-openjdk-java-access-bridge-security.patch
- Resolves: rhbz#950380
[1.7.0.19-2.3.8.2.el6]
- Added latest Fedora spec changes
- Bumped release
- Removed patch2 java-1.7.0-openjdk-java-access-bridge-idlj.patch (unapplied)
- zlib in BuildReq restricted for 1.2.3-7 or higher
- see https://bugzilla.redhat.com/show_bug.cgi?id=904231
- Removed a -icedtea tag from the version
- package have less and less connections to icedtea7
- Added gcc-c++ build dependence. Sometimes caused troubles during rpm -bb
- Added (Build)Requires for fontconfig and xorg-x11-fonts-Type1
- see https://bugzilla.redhat.com/show_bug.cgi?id=721033 for details
- Removed all fonconfig files. Fonts are now handled differently in JDK
and those files are redundant. This is going to be usptreamed.
- see https://bugzilla.redhat.com/show_bug.cgi?id=902227 for details
- logging.properties marked as config(noreplace)
- see https://bugzilla.redhat.com/show_bug.cgi?id=679180 for details
- classes.jsa marked as ghost on full path
- see https://bugzilla.redhat.com/show_bug.cgi?id=918172 for details
- nss.cfg was marked as config(noreplace)
- Add symlink to default soundfont (see 541466)
- Resolves: rhbz#950380
[1.7.0.9-2.3.8.1.el6]
- Added and applied patch 116 - patch 116 rh905128-non_block_ciphers.patch
- Added and applied patch 117 - patch 117 java-1.7.0-openjdk-nss-multiplePKCS11libraryInitialisationNnonCritical.patch
- to enable handleStartupErrors = ignoreMultipleInitialisation in icedtea 2.3
- Restorered removed nss support
- Fixed java-1.7.0-openjdk-nss-config-{1,2} patches to be valid for icedtea 2.3.x
- enable_nss switch to 0 - disabled
- Resolves: rhbz#950380
Обновленные пакеты
Oracle Linux 6
Oracle Linux x86_64
java-1.7.0-openjdk
1.7.0.19-2.3.9.1.0.1.el6_4
java-1.7.0-openjdk-demo
1.7.0.19-2.3.9.1.0.1.el6_4
java-1.7.0-openjdk-devel
1.7.0.19-2.3.9.1.0.1.el6_4
java-1.7.0-openjdk-javadoc
1.7.0.19-2.3.9.1.0.1.el6_4
java-1.7.0-openjdk-src
1.7.0.19-2.3.9.1.0.1.el6_4
Oracle Linux i686
java-1.7.0-openjdk
1.7.0.19-2.3.9.1.0.1.el6_4
java-1.7.0-openjdk-demo
1.7.0.19-2.3.9.1.0.1.el6_4
java-1.7.0-openjdk-devel
1.7.0.19-2.3.9.1.0.1.el6_4
java-1.7.0-openjdk-javadoc
1.7.0.19-2.3.9.1.0.1.el6_4
java-1.7.0-openjdk-src
1.7.0.19-2.3.9.1.0.1.el6_4
Ссылки на источники
Связанные уязвимости
ELSA-2013-0752: java-1.7.0-openjdk security update (IMPORTANT)
ELSA-2013-0770: java-1.6.0-openjdk security update (IMPORTANT)
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "missing security restrictions" in the LogStream.setDefaultStream method.
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "missing security restrictions" in the LogStream.setDefaultStream method.
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "missing security restrictions" in the LogStream.setDefaultStream method.