First published: Wed Mar 17 2010(Updated: )
The IBM 1.4.2 SR13-FP4 Java release includes the IBM Java 2 Runtime<br>Environment and the IBM Java 2 Software Development Kit.<br>A flaw was found in the way the TLS/SSL (Transport Layer Security/Secure<br>Sockets Layer) protocols handle session renegotiation. A man-in-the-middle<br>attacker could use this flaw to prefix arbitrary plain text to a client's<br>session (for example, an HTTPS connection to a website). This could force<br>the server to process an attacker's request as if authenticated using the<br>victim's credentials. (CVE-2009-3555)<br>This update disables renegotiation in the non-default IBM JSSE2 provider<br>for the Java Secure Socket Extension (JSSE) component. The default JSSE<br>provider is not updated with this fix. Refer to the IBMJSSE2 Provider<br>Reference Guide, linked to in the References, for instructions on how to<br>configure the IBM Java 2 Runtime Environment to use the JSSE2 provider by<br>default.<br>When using the JSSE2 provider, unsafe renegotiation can be re-enabled using<br>the com.ibm.jsse2.renegotiate property. Refer to the following<br>Knowledgebase article for details:<br><a href="http://kbase.redhat.com/faq/docs/DOC-20491" target="_blank">http://kbase.redhat.com/faq/docs/DOC-20491</a> This update also fixes the following bug:<br><li> the libjaasauth.so file was missing from the java-1.4.2-ibm packages for</li> the Intel Itanium architecture (.ia64.rpm). This update adds the file to<br>the packages for the Itanium architecture, which resolves this issue.<br>(BZ#572577)<br>All users of java-1.4.2-ibm are advised to upgrade to these updated<br>packages, which contain the IBM 1.4.2 SR13-FP4 Java release. All running<br>instances of IBM Java must be restarted for this update to take effect.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/java | <1.4.2-ibm-1.4.2.13.4-1jpp.1.el5 | 1.4.2-ibm-1.4.2.13.4-1jpp.1.el5 |
redhat/java | <1.4.2-ibm-1.4.2.13.4-1jpp.1.el5 | 1.4.2-ibm-1.4.2.13.4-1jpp.1.el5 |
redhat/java | <1.4.2-ibm-demo-1.4.2.13.4-1jpp.1.el5 | 1.4.2-ibm-demo-1.4.2.13.4-1jpp.1.el5 |
redhat/java | <1.4.2-ibm-demo-1.4.2.13.4-1jpp.1.el5 | 1.4.2-ibm-demo-1.4.2.13.4-1jpp.1.el5 |
redhat/java | <1.4.2-ibm-devel-1.4.2.13.4-1jpp.1.el5 | 1.4.2-ibm-devel-1.4.2.13.4-1jpp.1.el5 |
redhat/java | <1.4.2-ibm-devel-1.4.2.13.4-1jpp.1.el5 | 1.4.2-ibm-devel-1.4.2.13.4-1jpp.1.el5 |
redhat/java | <1.4.2-ibm-javacomm-1.4.2.13.4-1jpp.1.el5 | 1.4.2-ibm-javacomm-1.4.2.13.4-1jpp.1.el5 |
redhat/java | <1.4.2-ibm-javacomm-1.4.2.13.4-1jpp.1.el5 | 1.4.2-ibm-javacomm-1.4.2.13.4-1jpp.1.el5 |
redhat/java | <1.4.2-ibm-jdbc-1.4.2.13.4-1jpp.1.el5 | 1.4.2-ibm-jdbc-1.4.2.13.4-1jpp.1.el5 |
redhat/java | <1.4.2-ibm-plugin-1.4.2.13.4-1jpp.1.el5 | 1.4.2-ibm-plugin-1.4.2.13.4-1jpp.1.el5 |
redhat/java | <1.4.2-ibm-src-1.4.2.13.4-1jpp.1.el5 | 1.4.2-ibm-src-1.4.2.13.4-1jpp.1.el5 |
redhat/java | <1.4.2-ibm-src-1.4.2.13.4-1jpp.1.el5 | 1.4.2-ibm-src-1.4.2.13.4-1jpp.1.el5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2010:0155 is classified as moderate.
To fix RHSA-2010:0155, update to the latest version of the affected IBM Java packages.
RHSA-2010:0155 affects multiple versions of IBM Java, specifically version 1.4.2-ibm up to 1.4.2-ibm-1.4.2.13.4-1jpp.1.el5.
RHSA-2010:0155 addresses a flaw in the TLS/SSL protocols related to session renegotiation.
Yes, there is a related security bug documented under Bugzilla, specifically Bug 533125.