-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Format: 1.8 Date: Thu, 09 Jun 2011 16:56:39 +0200 Source: sun-java6 Binary: sun-java6-jre sun-java6-bin sun-java6-plugin ia32-sun-java6-bin ia32-sun-java6-plugin sun-java6-fonts sun-java6-jdk sun-java6-demo sun-java6-source sun-java6-javadb Architecture: i386 Version: 6.26-0squeeze1 Distribution: squeeze Urgency: high Maintainer: i386 Build Daemon Changed-By: Torsten Werner Description: ia32-sun-java6-bin - Sun Java(TM) Runtime Environment (JRE) 6 (32-bit) ia32-sun-java6-plugin - The Java(TM) Plug-in, Java SE 6 (32-bit) sun-java6-bin - Sun Java(TM) Runtime Environment (JRE) 6 (architecture dependent sun-java6-demo - Sun Java(TM) Development Kit (JDK) 6 demos and examples sun-java6-fonts - Lucida TrueType fonts (from the Sun JRE) sun-java6-javadb - Java(TM) DB, Sun Microsystems' distribution of Apache Derby sun-java6-jdk - Sun Java(TM) Development Kit (JDK) 6 sun-java6-jre - Sun Java(TM) Runtime Environment (JRE) 6 (architecture independen sun-java6-plugin - The Java(TM) Plug-in, Java SE 6 sun-java6-source - Sun Java(TM) Development Kit (JDK) 6 source files Closes: 629852 Changes: sun-java6 (6.26-0squeeze1) stable; urgency=high . [ Sylvestre Ledru ] * New upstream release (Closes: #629852) * SECURITY UPDATE: multiple upstream vulnerabilities. Upstream fixes: - (CVE-2011-0862): integer overflows in JPEGImageReader and font SunLayoutEngine (2D, 7013519) - (CVE-2011-0873): unspecified vulnerability fixed in 6u26 (2D) - (CVE-2011-0815): FileDialog.show() buffer overflow (AWT, 7012520) - (CVE-2011-0817): unspecified vulnerabilities fixed in 6u26 (Deployment, JRE) - (CVE-2011-0863): unspecified vulnerability fixed in 6u26 (Deployment) - (CVE-2011-0864): JVM memory corruption via certain bytecode (HotSpot, 7020373) - (CVE-2011-0802): unspecified vulnerabilities fixed in 6u26 (Sound) - (CVE-2011-0814): unspecified vulnerabilities fixed in 6u26 (Sound) - (CVE-2011-0871): MediaTracker created Component instances with unnecessary privileges (Swing, 7020198) - (CVE-2011-0786): unspecified vulnerabilities fixed in 6u26 (Deployment, JRE) - (CVE-2011-0788): unspecified vulnerabilities fixed in 6u26 (Deployment, JRE) - (CVE-2011-0866): unspecified vulnerabilities fixed in 6u26 (Deployment, JRE) - (CVE-2011-0868): incorrect numeric type conversion in TransformHelper (2D, 7016495) - (CVE-2011-0872): non-blocking sockets incorrectly selected for reading (NIO, 6213702) - (CVE-2011-0867): NetworkInterface information leak (Networking, 7013969) - (CVE-2011-0869): unprivileged proxy settings change via SOAPConnection (SAAJ, 7013971) - (CVE-2011-0865): Deserialization allows creation of mutable SignedObject (Deserialization, 6618658) . [ Torsten Werner ] * Upload to stable. Checksums-Sha1: 8fdf9a160af5aa8e72d924b08d96d5cc77dcc55e 30154572 sun-java6-bin_6.26-0squeeze1_i386.deb 7218f3500a0199a7601c655d691c6e101af14b27 2012 sun-java6-plugin_6.26-0squeeze1_i386.deb 53cfb42a48010f4baa773dfe3e0def234e70efd9 20231612 sun-java6-jdk_6.26-0squeeze1_i386.deb 6d1fa8ab1e3cc3ea65c08b4290bfa3177ba40111 12128170 sun-java6-demo_6.26-0squeeze1_i386.deb Checksums-Sha256: a38b1b3d512b319ced879bc547e1ce3a7e7eda3417ace8962923affbad95de19 30154572 sun-java6-bin_6.26-0squeeze1_i386.deb fe81fcd6a5858fa83b28f4b1dd4fa891dfc5c44a19d16bb9323c6fdd837ce980 2012 sun-java6-plugin_6.26-0squeeze1_i386.deb 2d407277de54c1a02905d9e2fdde1018c620ee72962a12ec2d5efbab89ef4c0e 20231612 sun-java6-jdk_6.26-0squeeze1_i386.deb 7b3b554a462966a7a2bb83be225c7ce74fb33893be9db754beaa7c31b98e3c4e 12128170 sun-java6-demo_6.26-0squeeze1_i386.deb Files: 3aa7ecb998dbaa8be799c336caecdd86 30154572 non-free/java optional sun-java6-bin_6.26-0squeeze1_i386.deb cc8caab68d4a79cb1d0cfeda1054c963 2012 non-free/web optional sun-java6-plugin_6.26-0squeeze1_i386.deb e61af0d3ba00dce7b8527737493186a8 20231612 non-free/java optional sun-java6-jdk_6.26-0squeeze1_i386.deb 949a9ac671ba95658b8bf538c9c33ef5 12128170 non-free/java optional sun-java6-demo_6.26-0squeeze1_i386.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) iQIcBAEBCAAGBQJN9iQsAAoJEHY75GREw+rHHJkP/1+ZL6S11L9FTNP9gUqE1PLt 8saPv7ADd4qvcaOQz2pAVcL/G+g8WnKRcksf68vrHfNEiaKWPXhLxd5oSUeuEGTI zf1XCTP/CRCpKIppO6+S39PUQupaWz2LIMBUbBfi/r57rY+Mmd0E4YcpyHqxXM73 gOmJxATVIOTikLg3PWjjjB8iPNbi+QceXf+j1b0irAne748IR5QC4wsl6bS4RXW8 uypChTQHkf1j07dTkilJ8WDcjBFnMoP6J3rAYObRXXbmzO2u0TdVRC57RyjPUu1E H2/I7p3TvE8rUELdKp6jj4VsPOuvSquUYJR+FhqWaLoOkGXudtsaUuLTk1SVNSg3 OrjUWkMdVeCtjiShvkQhabFyT18vrFAiATXY/K0al8RCRqMu/IX8pqW0LKdxmfa3 /0P6YzuQFBACga1O6RE4zQjN46AeAborodWsCtPnlf6xM6Ozj4JS+f7ZPxhExVU0 8yWQRJUUHBq+37i7mzdAd43tMGtkZuJHTF6WiIyF44fbN1djJKfMRpauDFEeUZBG qCNLrczrhU0eHA2z7Bpgksab/FmX9FYevrSBocvZ7TCgpbDREMLqgpWqUzv8UZvC ew/zuoFE3Em5NH8Z1vnUbpFHA7T43838F1wqGX1hj+a5G3Isw5Z7iItwB8hzhBHe Fc+ZPxoHy4s64tkcMbIj =D0Cq -----END PGP SIGNATURE-----