Bug 675942 (CVE-2010-4472) - CVE-2010-4472 OpenJDK untrusted code allowed to replace DSIG/C14N implementation (6994263)
Summary: CVE-2010-4472 OpenJDK untrusted code allowed to replace DSIG/C14N implementat...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2010-4472
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: Unspecified
OS: Unspecified
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 676274 676275 676276 676277 676694 676695 676696
Blocks:
TreeView+ depends on / blocked
 
Reported: 2011-02-08 11:22 UTC by Marc Schoenefeld
Modified: 2019-09-29 12:42 UTC (History)
5 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2016-09-09 02:25:01 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2011:0281 0 normal SHIPPED_LIVE Important: java-1.6.0-openjdk security update 2011-02-17 18:15:12 UTC
Red Hat Product Errata RHSA-2011:0282 0 normal SHIPPED_LIVE Critical: java-1.6.0-sun security update 2011-02-17 18:13:17 UTC

Description Marc Schoenefeld 2011-02-08 11:22:42 UTC
A flaw was found in the XML Digital Signature component in OpenJDK. Untrusted code could use this flaw to replace the Java Runtime Environment (JRE) XML Digital Signature Transform or C14N algorithm implementations to intercept digital signature operations.

Comment 3 errata-xmlrpc 2011-02-17 18:13:32 UTC
This issue has been addressed in following products:

  Supplementary for Red Hat Enterprise Linux 5
  Supplementary for Red Hat Enterprise Linux 6
  Extras for RHEL 4

Via RHSA-2011:0282 https://rhn.redhat.com/errata/RHSA-2011-0282.html

Comment 4 errata-xmlrpc 2011-02-17 18:15:28 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5
  Red Hat Enterprise Linux 6

Via RHSA-2011:0281 https://rhn.redhat.com/errata/RHSA-2011-0281.html


Note You need to log in before you can comment on or make changes to this bug.