Novell is now a part of Micro Focus

Security update for IBMJava5-JRE,IBMJava5-SDK

Knowledgebase

(Last modified: 01FEB2008)


solutions Security update for IBMJava5-JRE, IBMJava5-SDK SuSE Linux Maintenance Web (9a5ab06f4b454def4dc88e7b2a5b241b)

Applies to

Package: IBMJava5-JRE
IBMJava5-SDK
Product(s): SUSE CORE 9 for x86
SUSE CORE 9 for IBM POWER
SUSE CORE 9 for IBM S/390 31bit
SUSE CORE 9 for IBM zSeries 64bit
SUSE CORE 9 for AMD64 and Intel EM64T
Novell Linux POS 9
Open Enterprise Server
Patch: patch-12063
Release: 20080201
Obsoletes: none

Indications

Everyone should update.

Contraindications

None.

Problem description

The IBM Java JRE/SDK has been brought to release 1.5.0 SR6, containing several bugfixes, including the following security fixes:
  • CVE-2007-5232: A vulnerability in the Java Runtime Environment (JRE) with applet caching may allow an untrusted applet that is downloaded from a malicious website to make network connections to network services on machines other than the one that the applet was downloaded from. This may allow network resources (such as web pages) and vulnerabilities (that exist on these network services) which are not otherwise normally accessible to be accessed or exploited.
  • CVE-2007-5274: A vulnerability in the Java Runtime Environment (JRE) may allow malicious Javascript code that is downloaded by a browser from a malicious website to make network connections, through Java APIs, to network services on machines other than the one that the Javascript code was downloaded from. This may allow network resources (such as web pages) and vulnerabilities (that exist on these network services) which are not otherwise normally accessible to be accessed or exploited.
  • CVE-2007-5273: A second vulnerability in the JRE may allow an untrusted applet that is downloaded from a malicious website through a web proxy to make network connections to network services on machines other than the one that the applet was downloaded from. This may allow network resources (such as web pages) and vulnerabilities (that exist on these network services) which are not otherwise normally accessible to be accessed or exploited.
  • CVE-2007-5236: An untrusted Java Web Start application may write arbitrary files with the privileges of the user running the application.
  • CVE-2007-5238: Three separate vulnerabilities may allow an untrusted Java Web Start application to determine the location of the Java Web Start cache.
  • CVE-2007-5239: An untrusted Java Web Start application or Java applet may move or copy arbitrary files by requesting the user of the application or applet to drag and drop a file from the Java Web Start application or Java applet window.
  • CVE-2007-5240: An untrusted applet may display an over-sized window so that the applet warning banner is not visible to the user running the untrusted applet. CVE-2007-4381: A vulnerability in the font parsing code in the Java Runtime Environment may allow an untrusted applet to elevate its privileges. For example, an applet may grant itself permissions to read and write local files or execute local applications that are accessible to the user running the untrusted applet.
  • CVE-2007-3698: The Java Secure Socket Extension (JSSE) that is included in various releases of the Java Runtime Environment does not correctly process SSL/TLS handshake requests. This vulnerability may be exploited to create a Denial of Service (DoS) condition to the system as a whole on a server that listens for SSL/TLS connections using JSSE for SSL/TLS support.
For more information see:
http://www-128.ibm.com/developerworks/java/jdk/alerts/
Also, the timezone data was fixed for the last Argentinia updates.

Solution

Please install the updates provided at the location noted below.

Installation notes

This update is provided as an RPM package that can easily be installed onto a running system by using this command:
rpm -Fvh IBMJava5*.rpm

links to download packages

Download Source Packages

Download the source code of the patches for maintained products.


Disclaimer

The Origin of this information may be internal or external to Novell. Novell makes all reasonable efforts to verify this information. However, the information provided in this document is for your information only. Novell makes no explicit or implied claims to the validity of this information.

Any trademarks referenced in this document are the property of their respective owners. Consult your product manuals for complete trademark information.

© Copyright Micro Focus or one of its affiliates