Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 190686 - dev-java/jrockit-jdk-bin Multiple Vulnerabilities
Summary: dev-java/jrockit-jdk-bin Multiple Vulnerabilities
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High normal (vote)
Assignee: Gentoo Security
URL: http://secunia.com/advisories/26631/
Whiteboard: B2 [glsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2007-08-29 18:56 UTC by Matt Fleming (RETIRED)
Modified: 2007-09-24 18:34 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Matt Fleming (RETIRED) gentoo-dev 2007-08-29 18:56:44 UTC
Some vulnerabilities have been reported in JRockit, which can be
exploited by malicious people to bypass certain security
restrictions, conduct cross-site scripting attacks, to cause a DoS
(Denial of Service), or to compromise a vulnerable system.

1) An integer overflow error within the parser for embedded ICC
profiles of JPG and BMP images can be exploited to cause a DoS or to
potentially execute arbitrary code.

For more information see vulnerability #1 in:
SA25295

2) An error within the BMP file parser can be exploited to cause a
DoS.

For more information see vulnerability #2 in:
SA25295

3) An error when generating HTML documentation pages with JavaDoc can
potentially be exploited to conduct cross-site scripting attacks.

For more information:
SA25769

4) An error exists when processing SSL/TLS handshake requests can be
exploited to cause a DoS.

For more information see vulnerability #1:
SA26015

5) An error within the Java Runtime Environment Applet Class Loader
can be exploited to establish restricted network connections to
certain services running on the local host.

For more information see vulnerability #2:
SA26015

6) An error when processing XSLT stylesheets contained in XSLT
Transforms in XML signatures can be exploited to execute arbitrary
code.

For more information:
SA26031

7) An unspecified error in the parsing of fonts contained in Java
applets can be exploited to read and write local files, or to execute
local applications.

For more information:
SA26402

The vulnerabilities affect BEA JRockit versions R27.3.1 and prior,
and BEA JRockit versions 7.0 SP6 and prior.

SOLUTION:
Apply patches (see vendor advisories for details).

PROVIDED AND/OR DISCOVERED BY:
Reported by the vendor.

ORIGINAL ADVISORY:
4) http://dev2dev.bea.com/pub/advisory/249
1,2,3,5,6,7) http://dev2dev.bea.com/pub/advisory/248
Comment 1 Matt Fleming (RETIRED) gentoo-dev 2007-08-29 18:59:27 UTC
CC'ing maintainers and setting whiteboard status.
Comment 2 Vlastimil Babka (Caster) (RETIRED) gentoo-dev 2007-08-31 13:27:32 UTC
Thanks for the info. Would never find it by my occasional looking at the download pages, they released it in a nonstandard way, hm.

Added, had to make up the _p1 suffix to distinguish it, which upstream didn't.

Arches please stabilize:
1.4.2.14_p1 (x86+ia64 only)
1.5.0.11_p1 (all)
Comment 3 Chris Gianelloni (RETIRED) gentoo-dev 2007-08-31 17:43:44 UTC
My weblogic likes it on amd64, so I like it... amd64 stable...
Comment 4 Christian Faulhammer (RETIRED) gentoo-dev 2007-09-01 08:37:31 UTC
x86 stable
Comment 5 Raúl Porcel (RETIRED) gentoo-dev 2007-09-01 10:27:10 UTC
ia64 stable
Comment 6 Pierre-Yves Rofes (RETIRED) gentoo-dev 2007-09-08 12:15:44 UTC
B2 so no need for a vote. glsa request filed.
Comment 7 Raphael Marichez (Falco) (RETIRED) gentoo-dev 2007-09-23 22:33:41 UTC
it's GLSA 200709-15, s'ry for the delay
Comment 8 Vlastimil Babka (Caster) (RETIRED) gentoo-dev 2007-09-24 18:34:04 UTC
Just wondering why you didn't cover both slots as usual and glsa recommends only >=1.5.0.11_p1 ?