[영향을 받는 소프트웨어 및 업데이트 버전]
□ JDK and JRE 7 Update 17 버전 및 하위 버전 → JDK and JRE 7 Update 21 버전
□ JDK and JRE 6 Update 43 버전 및 하위 버전 → JDK and JRE 6 Update 45 버전
□ JDK and JRE 5.0 Update 41 버전 및 하위 버전 → JDK and JRE 5.0 Update 43 버전
□ JavaFX 2.2.7 버전 및 하위 버전 → JavaFX 2.2.21 버전
또한 이번 업데이트에서는 중요한 기능개선이 포함 되어 있습니다.
1. Java 제어판 보안 설정 변경 사항
- 낮음 및 사용자 정의 설정이 보안 슬러이더에서 제거
(기존의 "사용자", "낮음" 설정 부분을 제거한 "5단계 → 3단계"로 슬라이드바 축소)
2. 보안 대화상자 변경
- 업데이트 관련 내용 : http://www.oracle.com/technetwork/java/javase/7u21-relnotes-1932873.html
Java™ SE Development Kit 7, Update 21 (JDK 7u21)
The full version string for this update release is 1.7.0_21-b11 (where "b" means "build") except for Mac OS X for which it is 1.7.0_21-b12. The version number is 7u21.
Highlights
This update release contains several enhancements and changes including the following:
- Blacklisted Jars and Certificates
- Changes to Java Control Panel's Security Settings
- Changes to Security Dialogs
- Changes to RMI
- Server JRE
- JDK for Linux on ARM
- Changes to Runtime.exec
Olson Data 2012i
JDK 7u21 contains Olson time zone data version 2012i. For more information, refer to Timezone Data Versions in the JRE Software.
Security Baselines
The security baselines for the Java Runtime Environment (JRE) at the time of the release of JDK 7u21 are specified in the following table:
JRE Family Version | JRE Security Baseline (Full Version String) |
---|---|
7 | 1.7.0_21 |
6 | 1.6.0_45 |
5.0 | 1.5.0_45 |
For more information about security baselines, see Deploying Java Applets With Family JRE Versions in Java Plug-in for Internet Explorer.
JRE Expiration Date
The expiration date for JRE 7u21 is 07/18/2013.
Blacklisted Jars and Certificates
Oracle now manages a certificate and jar blacklist repository. This data is updated on client computers daily on the first execution of a Java applet or web start application.
Changes to Java Control Panel's Security Settings
In this release, low
and custom
settings are removed from the Java Control Panel(JCP)'s Security Slider.
Depending on the security level set in the Java Control Panel and the user's version of the JRE, self-signed or unsigned applications might not be allowed to run. The default setting of High permits all but local applets to run on a secure JRE. If the user is running an insecure JRE, only applications that are signed with a certificate issued by a recognized certificate authority are allowed to run.
For more information, see the Security section of the Java Control Panel documentation.
Changes to Security Dialogs
As of JDK 7u21, JavaScript code that calls code within a privileged applet is treated as mixed code and warning dialogs are raised if the signed JAR files are not tagged with the Trusted-Library attribute.
For more information, see Mixing Privileged Code and Sandbox Code documentation.
The JDK 7u21 release enables users to make more informed decisions before running Rich Internet Applications (RIAs) by prompting users for permissions before an RIA is run. These permission dialogs include information on the certificate used to sign the application, the location of the application, and the level of access that the application requests. For more information, seeUser Acceptance of RIAs.
Changes to RMI
From this release, the RMI property java.rmi.server.useCodebaseOnly
is set to true
by default. In previous releases the default value was false
.
This change of default value may cause RMI-based applications to break unexpectedly. The typical symptom is a stack trace that contains a java.rmi.UnmarshalException
containing a nestedjava.lang.ClassNotFoundException
.
For more information, see RMI Enhancements.
Server JRE
A new Server JRE package, with tools commonly required for server deployments but without the Java plug-in, auto-update or installer found in the regular JRE package, is available starting from this release. The Server JRE is specifically targeted for deploying Java in server environments and is available for 64-bit Solaris, Windows and Linux platforms. For more information on installing this package, see Installation Instructions.
Some of the tools included in the initial release of the Server JRE package, may not be available in future versions of the Server JRE. Please check future release notes for tools availability if you use this package.
JDK for Linux on ARM
JDk 7u21 release includes support for JDK for Linux on ARM. The product offers headful support for ARMv6 and ARMv7.
The following JDK features are not included or supported in this product:
- Java WebStart
- Java Plug-In
- Garbage First (G1) Collector
- JavaFX SDK or JavaFX Runtime
In addition, some features of the Serviceability Agent are also not available for Linux on ARM platform.
Java support on ARM is specific to the GNOME Desktop Environment version 1:2.30+7
.
Changes to Runtime.exec
On Windows platform, the decoding of command strings specified to Runtime.exec(String)
,Runtime.exec(String,String[])
and
Runtime.exec(String,String[],File)
methods, has been improved to follow the specification more closely. This may cause problems for applications that are using one or more of these methods with commands that contain spaces in the program name, or are invoking these methods with commands that are not quoted correctly.
For example, Runtime.getRuntime().exec("C:\\My Programs\\foo.exe bar")
is an attempt to launch the program "C:\\My"
with the arguments "Programs\\foo.exe"
and "bar"
. This command is likely to fail with an exception to indicate "C:\My"
cannot be found.
The example Runtime.getRuntime().exec("\"C:\\My Programs\\foo.exe\" bar")
is an attempt to launch the program "\"C:\\My"
. This command will fail with an exception to indicate the program has an embedded quote.
Applications that need to launch programs with spaces in the program name should consider using the variants of Runtime.exec
that allow the command and arguments to be specified in an array.
Alternatively, the preferred way to create operating systems processes since JDK 5.0 is usingjava.lang.ProcessBuilder
. The ProcessBuilder
class has a much more complete API for setting the environment, working directory and redirecting streams for the process.
Bug Fixes
This release contains fixes for security vulnerabilities. For more information, see Oracle Java SE Critical Patch Update Advisory.
업데이트 방법은 자바의 자동 업데이트를 실행하던가,
[제어판]에 가서 [JAVA] 를 실행시킨 후 [지금 업데이트] 하면 된다.
'취약점소식' 카테고리의 다른 글
한글(HWP), 보안 취약점 보안 업데이트 (2013-08-30) (0) | 2013.08.31 |
---|---|
[MS] Internet Explorer 원격코드 실행 신규 취약점 주의 권고(0-Day : CVE-2013-1347) + CVE-2013-1347 MSHTML Shim Workaround(Fix it) (2) | 2013.05.09 |
한글(HWP), 보안 취약점 보안 업데이트 (2013-03-008) (0) | 2013.03.12 |
카카오톡(Kakao Talk), 세션정보 탈취 취약점 보안 업데이트 (2012-03-08) (0) | 2013.03.12 |
[Oracle Java] 오라클 자바 JRE 신규취약점 0-Day(CVE-2013-1493) 보안 업데이트 공개!! (0) | 2013.03.05 |
댓글