diff options
Diffstat (limited to 'xml/htdocs/security/en/glsa/glsa-200701-15.xml')
-rw-r--r-- | xml/htdocs/security/en/glsa/glsa-200701-15.xml | 99 |
1 files changed, 99 insertions, 0 deletions
diff --git a/xml/htdocs/security/en/glsa/glsa-200701-15.xml b/xml/htdocs/security/en/glsa/glsa-200701-15.xml new file mode 100644 index 00000000..ad2822cb --- /dev/null +++ b/xml/htdocs/security/en/glsa/glsa-200701-15.xml @@ -0,0 +1,99 @@ +<?xml version="1.0" encoding="utf-8"?> +<?xml-stylesheet href="/xsl/glsa.xsl" type="text/xsl"?> +<?xml-stylesheet href="/xsl/guide.xsl" type="text/xsl"?> +<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> + +<glsa id="200701-15"> + <title>Sun JDK/JRE: Multiple vulnerabilities</title> + <synopsis> + Multiple unspecified vulnerabilities have been identified in Sun Java + Development Kit (JDK) and Java Runtime Environment (JRE). + </synopsis> + <product type="ebuild">java</product> + <announced>January 22, 2007</announced> + <revised>July 16, 2008: 04</revised> + <bug>158659</bug> + <access>remote</access> + <affected> + <package name="dev-java/sun-jdk" auto="yes" arch="*"> + <unaffected range="ge">1.5.0.09</unaffected> + <unaffected range="rge">1.4.2.18</unaffected> + <unaffected range="rge">1.4.2.17</unaffected> + <unaffected range="rge">1.4.2.15</unaffected> + <unaffected range="rge">1.4.2.14</unaffected> + <unaffected range="rge">1.4.2.13</unaffected> + <vulnerable range="lt">1.5.0.09</vulnerable> + </package> + <package name="dev-java/sun-jre-bin" auto="yes" arch="*"> + <unaffected range="ge">1.5.0.09</unaffected> + <unaffected range="rge">1.4.2.18</unaffected> + <unaffected range="rge">1.4.2.17</unaffected> + <unaffected range="rge">1.4.2.15</unaffected> + <unaffected range="rge">1.4.2.14</unaffected> + <unaffected range="rge">1.4.2.13</unaffected> + <vulnerable range="lt">1.5.0.09</vulnerable> + </package> + </affected> + <background> + <p> + The Sun Java Development Kit (JDK) and the Sun Java Runtime Environment + (JRE) provide the Sun Java platform. + </p> + </background> + <description> + <p> + Chris Evans has discovered multiple buffer overflows in Sun JDK and Sun + JRE possibly related to various AWT or font layout functions. Tom + Hawtin has discovered an unspecified vulnerability in Sun JDK and Sun + JRE relating to unintended applet data access. He has also discovered + multiple other unspecified vulnerabilities in Sun JDK and Sun JRE + allowing unintended Java applet or application resource acquisition. + </p> + </description> + <impact type="normal"> + <p> + An attacker could entice a user to run a specially crafted Java applet + or application that could read, write, or execute local files with the + privileges of the user running the JVM; access data maintained in other + Java applets; or escalate the privileges of the currently running Java + applet or application allowing for unauthorized access to system + resources. + </p> + </impact> + <workaround> + <p> + There is no known workaround at this time. + </p> + </workaround> + <resolution> + <p> + All Sun Java Development Kit users should upgrade to the latest + version: + </p> + <code> + # emerge --sync + # emerge --ask --oneshot --verbose "dev-java/sun-jdk"</code> + <p> + All Sun Java Runtime Environment users should upgrade to the latest + version: + </p> + <code> + # emerge --sync + # emerge --ask --oneshot --verbose "dev-java/sun-jre-bin"</code> + </resolution> + <references> + <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6731">CVE-2006-6731</uri> + <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6736">CVE-2006-6736</uri> + <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6737">CVE-2006-6737</uri> + <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6745">CVE-2006-6745</uri> + </references> + <metadata tag="requester" timestamp="Fri, 12 Jan 2007 22:36:56 +0000"> + falco + </metadata> + <metadata tag="bugReady" timestamp="Sun, 14 Jan 2007 21:54:21 +0000"> + falco + </metadata> + <metadata tag="submitter" timestamp="Mon, 15 Jan 2007 01:12:01 +0000"> + shellsage + </metadata> +</glsa> |