Feeds

Sun patches Java patching

Coordinate, coordinate, coordinate

Reducing security risks from open source software

Microsoft's security practices seem to be rubbing off on Sun Microsystems as the company is changing the way it updates and secures Java.

Sun will synchronize releases of critical security updates to current and legacy version of Java Standard Edition (Java SE) and has promised to provide a system of alerts on upcoming patches.

Critical security fixes will be released simultaneously for Java SE 6, J2SE 5.0 and J2SE 1.4.2 (yes, crazy branding but the same software, folks), with plans to also cover J2SE 1.3.1 - no longer supported by Sun on Windows, Linux or Solaris 9 and 10 - next year. Updates will contain the same critical security fixes recommended for all enterprise and consumer users.

Java SE is important to Sun and developers thanks to its presence on PCs - in games and business applications - and because it serves as a foundational element of the Java Enterprise Edition (Java EE) stack.

There was no word from Sun on whether it also planned a similar system of synchronization and alerts for users running Java EE.

Sun's change seems geared to making the lives of developers and administrators who update and run increasingly dated and mixed Java environments a little easier. It will also help companies starting to bring in new PCs running Windows Vista with Java on the desktop.

While Sun wants customers running its latest implementations of Java SE, the company recognizes the fact that Java SE has broad and deep penetration among enterprises. "The advent of synchronized security fixes is welcome news for consumers and enterprise administrators running on older operating systems or other software requiring the use of older versions of the Java platform," Sun said.

Advanced notification of upcoming security updates are designed to help customers "plan for successful and timely deployment of critical Java fixes and updates." Alerts will summarize forthcoming changes and are expected up to post a week before synchronized security updates are released. Notifications will be posted here.

Sun and Microsoft have been getting quite cozy of late, as they work on technology interoperability. While not exactly renowned for the security of its own software, its widely recognized that Microsoft has taken some solid steps towards delivering an improved and more coordinated system of patches and updates, using bulletins and Patch Tuesday.

This can't have failed to have rubbed off on Sun as Java - now more than 10 years old - begins to resemble the kind of legacy infrastructure that Windows has become.

Just like legacy versions of Windows, Java is spread through the enterprise and requires ongoing updates that tackle a growing layer of interdependencies between Java and other, newer software to help ensure the security backdoor remains firmly closed.®

Mobile application security vulnerability report

More from The Register

next story
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Microsoft: You NEED bad passwords and should re-use them a lot
Dirty QWERTY a perfect P@ssword1 for garbage websites
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
NUDE SNAPS AGENCY: NSA bods love 'showing off your saucy selfies'
Swapping other people's sexts is a fringe benefit, says Snowden
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
British data cops: We need greater powers and more money
You want data butt kicking, we need bigger boots - ICO
Crooks fling banking Trojan at Japanese smut site fans
Wait - they're doing online banking with an unpatched Windows PC?
NIST told to grow a pair and kick NSA to the curb
Lrn2crypto, oversight panel tells US govt's algorithm bods
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.