Home » , » Hat Security Advisory 2012-1243-01

Hat Security Advisory 2012-1243-01

Written By Anonymous on 8 September 2012 | 9/08/2012 03:27:00 pm

----- BEGIN PGP SIGNED MESSAGE -----
Hash: SHA1

================================================== ===================
Red Hat Security Advisory

Sinopsis: Kritis: java-1.4.2-ibm pembaruan keamanan
Penasehat ID: RHSA-2012 :1243-01
Produk: Red Hat Enterprise Linux Ekstra
Penasehat URL: https://rhn.redhat.com/errata/RHSA-2012-1243.html
Isu Tanggal: 2012/09/07
CVE Nama: CVE-2012-1713 CVE-2012-1717 CVE-2012-1718
CVE-2012-1719
================================================== ===================

1. Ringkasan:

Diperbarui java-1.4.2-ibm paket yang memperbaiki beberapa masalah keamanan sekarang
tersedia untuk Red Hat Enterprise Linux 5 Tambahan.

The Red Hat Security Response Team telah dinilai pembaruan ini penting sebagai memiliki
keamanan dampak. Kerentanan umum Scoring System (CVSS) nilai dasar,
yang memberikan peringkat keparahan rinci, tersedia untuk setiap kerentanan
dari link CVE di bagian Referensi.

2. Relevan rilis / arsitektur:

Red Hat Enterprise Linux Desktop Tambahan (ayat 5) - i386, x86_64
Red Hat Enterprise Linux Server Tambahan (ayat 5) - i386, ia64, ppc, s390x, x86_64

3. Description:

IBM versi J2SE 1.4.2 termasuk IBM Java Runtime Environment dan
IBM Java Software Development Kit.

Pembaruan ini memperbaiki beberapa kelemahan dalam IBM Java Runtime
Lingkungan dan IBM Java Software Development Kit. Terperinci
deskripsi kerentanan yang terhubung dari halaman Keamanan IBM alert,
terdaftar di bagian Referensi. (CVE-2012-1713, CVE-2012-1717,
CVE-2012-1718, CVE-2012-1719)

Semua pengguna java-1.4.2-ibm disarankan untuk meng-upgrade tersebut diperbarui
paket, yang berisi IBM J2SE 1.4.2 SR13-FP13 rilis. Semua berjalan
contoh IBM Java harus direstart untuk update ini akan berlaku.

4. Solusi:

Sebelum menerapkan pembaruan ini, membuat semua errata sebelumnya dirilis yakin
relevan dengan sistem Anda telah diterapkan.

Pembaruan ini tersedia melalui Red Hat Network. Rincian tentang bagaimana
menggunakan Red Hat Network untuk menerapkan pembaruan ini tersedia di
https://access.redhat.com/knowledge/articles/11258

5. Bugs tetap (http://bugzilla.redhat.com/):

829.358 - CVE-2012-1717 OpenJDK: aman perizinan file sementara (JRE, 7.143.606)
829.361 - CVE-2012-1713 OpenJDK: FontManager tata letak lookup kode memori korupsi (2D, 7.143.617)
829.371 - CVE-2012-1719 OpenJDK: pengidentifikasi repositori bisa berubah dalam kode stub dihasilkan (CORBA, 7.143.851)
829.372 - CVE-2012-1718 OpenJDK: CRL dan perbaikan sertifikat penanganan ekstensi (Keamanan, 7.143.872)

6. Daftar Paket:

Red Hat Enterprise Linux Desktop Tambahan (ayat 5):

i386:
java-1.4.2-ibm-1.4.2.13.13-1jpp.1.el5_8.i386.rpm
java-1.4.2-ibm-demo-1.4.2.13.13-1jpp.1.el5_8.i386.rpm
java-1.4.2-ibm-devel-1.4.2.13.13-1jpp.1.el5_8.i386.rpm
java-1.4.2-ibm-javacomm-1.4.2.13.13-1jpp.1.el5_8.i386.rpm
java-1.4.2-ibm-jdbc-1.4.2.13.13-1jpp.1.el5_8.i386.rpm
java-1.4.2-ibm-plugin-1.4.2.13.13-1jpp.1.el5_8.i386.rpm
java-1.4.2-ibm-src-1.4.2.13.13-1jpp.1.el5_8.i386.rpm

x86_64:
java-1.4.2-ibm-1.4.2.13.13-1jpp.1.el5_8.i386.rpm
java-1.4.2-ibm-1.4.2.13.13-1jpp.1.el5_8.x86_64.rpm
java-1.4.2-ibm-demo-1.4.2.13.13-1jpp.1.el5_8.i386.rpm
java-1.4.2-ibm-demo-1.4.2.13.13-1jpp.1.el5_8.x86_64.rpm
java-1.4.2-ibm-devel-1.4.2.13.13-1jpp.1.el5_8.i386.rpm
java-1.4.2-ibm-devel-1.4.2.13.13-1jpp.1.el5_8.x86_64.rpm
java-1.4.2-ibm-javacomm-1.4.2.13.13-1jpp.1.el5_8.i386.rpm
java-1.4.2-ibm-javacomm-1.4.2.13.13-1jpp.1.el5_8.x86_64.rpm
java-1.4.2-ibm-jdbc-1.4.2.13.13-1jpp.1.el5_8.i386.rpm
java-1.4.2-ibm-plugin-1.4.2.13.13-1jpp.1.el5_8.i386.rpm
java-1.4.2-ibm-src-1.4.2.13.13-1jpp.1.el5_8.i386.rpm
java-1.4.2-ibm-src-1.4.2.13.13-1jpp.1.el5_8.x86_64.rpm

Red Hat Enterprise Linux Server Tambahan (ayat 5):

i386:
java-1.4.2-ibm-1.4.2.13.13-1jpp.1.el5_8.i386.rpm
java-1.4.2-ibm-demo-1.4.2.13.13-1jpp.1.el5_8.i386.rpm
java-1.4.2-ibm-devel-1.4.2.13.13-1jpp.1.el5_8.i386.rpm
java-1.4.2-ibm-javacomm-1.4.2.13.13-1jpp.1.el5_8.i386.rpm
java-1.4.2-ibm-jdbc-1.4.2.13.13-1jpp.1.el5_8.i386.rpm
java-1.4.2-ibm-plugin-1.4.2.13.13-1jpp.1.el5_8.i386.rpm
java-1.4.2-ibm-src-1.4.2.13.13-1jpp.1.el5_8.i386.rpm

ia64:
java-1.4.2-ibm-1.4.2.13.13-1jpp.1.el5_8.ia64.rpm
java-1.4.2-ibm-demo-1.4.2.13.13-1jpp.1.el5_8.ia64.rpm
java-1.4.2-ibm-devel-1.4.2.13.13-1jpp.1.el5_8.ia64.rpm
java-1.4.2-ibm-src-1.4.2.13.13-1jpp.1.el5_8.ia64.rpm

ppc:
java-1.4.2-ibm-1.4.2.13.13-1jpp.1.el5_8.ppc.rpm
java-1.4.2-ibm-1.4.2.13.13-1jpp.1.el5_8.ppc64.rpm
java-1.4.2-ibm-demo-1.4.2.13.13-1jpp.1.el5_8.ppc.rpm
java-1.4.2-ibm-demo-1.4.2.13.13-1jpp.1.el5_8.ppc64.rpm
java-1.4.2-ibm-devel-1.4.2.13.13-1jpp.1.el5_8.ppc.rpm
java-1.4.2-ibm-devel-1.4.2.13.13-1jpp.1.el5_8.ppc64.rpm
java-1.4.2-ibm-javacomm-1.4.2.13.13-1jpp.1.el5_8.ppc.rpm
java-1.4.2-ibm-javacomm-1.4.2.13.13-1jpp.1.el5_8.ppc64.rpm
java-1.4.2-ibm-jdbc-1.4.2.13.13-1jpp.1.el5_8.ppc.rpm
java-1.4.2-ibm-src-1.4.2.13.13-1jpp.1.el5_8.ppc.rpm
java-1.4.2-ibm-src-1.4.2.13.13-1jpp.1.el5_8.ppc64.rpm

s390x:
java-1.4.2-ibm-1.4.2.13.13-1jpp.1.el5_8.s390.rpm
java-1.4.2-ibm-1.4.2.13.13-1jpp.1.el5_8.s390x.rpm
java-1.4.2-ibm-demo-1.4.2.13.13-1jpp.1.el5_8.s390.rpm
java-1.4.2-ibm-demo-1.4.2.13.13-1jpp.1.el5_8.s390x.rpm
java-1.4.2-ibm-devel-1.4.2.13.13-1jpp.1.el5_8.s390.rpm
java-1.4.2-ibm-devel-1.4.2.13.13-1jpp.1.el5_8.s390x.rpm
java-1.4.2-ibm-jdbc-1.4.2.13.13-1jpp.1.el5_8.s390.rpm
java-1.4.2-ibm-src-1.4.2.13.13-1jpp.1.el5_8.s390.rpm
java-1.4.2-ibm-src-1.4.2.13.13-1jpp.1.el5_8.s390x.rpm

x86_64:
java-1.4.2-ibm-1.4.2.13.13-1jpp.1.el5_8.i386.rpm
java-1.4.2-ibm-1.4.2.13.13-1jpp.1.el5_8.x86_64.rpm
java-1.4.2-ibm-demo-1.4.2.13.13-1jpp.1.el5_8.i386.rpm
java-1.4.2-ibm-demo-1.4.2.13.13-1jpp.1.el5_8.x86_64.rpm
java-1.4.2-ibm-devel-1.4.2.13.13-1jpp.1.el5_8.i386.rpm
java-1.4.2-ibm-devel-1.4.2.13.13-1jpp.1.el5_8.x86_64.rpm
java-1.4.2-ibm-javacomm-1.4.2.13.13-1jpp.1.el5_8.i386.rpm
java-1.4.2-ibm-javacomm-1.4.2.13.13-1jpp.1.el5_8.x86_64.rpm
java-1.4.2-ibm-jdbc-1.4.2.13.13-1jpp.1.el5_8.i386.rpm
java-1.4.2-ibm-plugin-1.4.2.13.13-1jpp.1.el5_8.i386.rpm
java-1.4.2-ibm-src-1.4.2.13.13-1jpp.1.el5_8.i386.rpm
java-1.4.2-ibm-src-1.4.2.13.13-1jpp.1.el5_8.x86_64.rpm

Paket-paket ini GPG ditandatangani oleh Red Hat untuk keamanan. Kami kunci dan
rincian tentang bagaimana untuk memeriksa tanda tangan yang tersedia dari
https://access.redhat.com/security/team/key/ # paket

7. Referensi:

https://www.redhat.com/security/data/cve/CVE-2012-1713.html
https://www.redhat.com/security/data/cve/CVE-2012-1717.html
https://www.redhat.com/security/data/cve/CVE-2012-1718.html
https://www.redhat.com/security/data/cve/CVE-2012-1719.html
https://access.redhat.com/security/updates/classification/ # kritis
https://www.ibm.com/developerworks/java/jdk/alerts/

8. Hubungi:

Kontak Red Hat keamanan . Lebih lanjut hubungi
rincian di https://access.redhat.com/security/team/contact/

Hak Cipta 2012 Red Hat, Inc
----- BEGIN PGP SIGNATURE -----
Versi: GnuPG v1.4.4 (GNU / Linux)

iD8DBQFQSfPKXlSAg2UNWIIRAuaWAKC0zDvxO6eJjArBYhEf25qpyHwEIgCguHUT
v5B6iZgjFZQ6OwNQsvo + mfo =
= ZGLB
----- END PGP SIGNATURE -----


-
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
Share this article :

0 komentar:

Post a Comment

Information Visitor:

Free counters!
 
Support : Google
Copyright © 2014. Blog Manado - All Rights Reserved
Design By Vanidlesky
Powered By Blogger