First published: Thu Aug 06 2009(Updated: )
These packages provide the OpenJDK 6 Java Runtime Environment and the<br>OpenJDK 6 Software Development Kit. The Java Runtime Environment (JRE)<br>contains the software and tools that users need to run applications written<br>using the Java programming language.<br>A flaw was found in the way the XML Digital Signature implementation in the<br>JRE handled HMAC-based XML signatures. An attacker could use this flaw to<br>create a crafted signature that could allow them to bypass authentication,<br>or trick a user, applet, or application into accepting untrusted content.<br>(CVE-2009-0217)<br>Several potential information leaks were found in various mutable static<br>variables. These could be exploited in application scenarios that execute<br>untrusted scripting code. (CVE-2009-2475)<br>It was discovered that OpenType checks can be bypassed. This could allow a<br>rogue application to bypass access restrictions by acquiring references to<br>privileged objects through finalizer resurrection. (CVE-2009-2476)<br>A denial of service flaw was found in the way the JRE processes XML. A<br>remote attacker could use this flaw to supply crafted XML that would lead<br>to a denial of service. (CVE-2009-2625)<br>A flaw was found in the JRE audio system. An untrusted applet or<br>application could use this flaw to gain read access to restricted System<br>properties. (CVE-2009-2670)<br>Two flaws were found in the JRE proxy implementation. An untrusted applet<br>or application could use these flaws to discover the usernames of users<br>running applets and applications, or obtain web browser cookies and use<br>them for session hijacking attacks. (CVE-2009-2671, CVE-2009-2672)<br>An additional flaw was found in the proxy mechanism implementation. This<br>flaw allowed an untrusted applet or application to bypass access<br>restrictions and communicate using non-authorized socket or URL connections<br>to hosts other than the origin host. (CVE-2009-2673) <br>An integer overflow flaw was found in the way the JRE processes JPEG<br>images. An untrusted application could use this flaw to extend its<br>privileges, allowing it to read and write local files, as well as to<br>execute local applications with the privileges of the user running the<br>application. (CVE-2009-2674)<br>An integer overflow flaw was found in the JRE unpack200 functionality. An<br>untrusted applet or application could extend its privileges, allowing it to<br>read and write local files, as well as to execute local applications with<br>the privileges of the user running the applet or application. (CVE-2009-2675)<br>It was discovered that JDK13Services grants unnecessary privileges to<br>certain object types. This could be misused by an untrusted applet or<br>application to use otherwise restricted functionality. (CVE-2009-2689)<br>An information disclosure flaw was found in the way private Java variables<br>were handled. An untrusted applet or application could use this flaw to<br>obtain information from variables that would otherwise be private.<br>(CVE-2009-2690)<br>Note: The flaws concerning applets in this advisory, CVE-2009-2475,<br>CVE-2009-2670, CVE-2009-2671, CVE-2009-2672, CVE-2009-2673, CVE-2009-2675,<br>CVE-2009-2689, and CVE-2009-2690, can only be triggered in<br>java-1.6.0-openjdk by calling the "appletviewer" application.<br>This update also fixes the following bug:<br><li> the EVR in the java-1.6.0-openjdk package as shipped with Red Hat</li> Enterprise Linux allowed the java-1.6.0-openjdk package from the EPEL<br>repository to take precedence (appear newer). Users using<br>java-1.6.0-openjdk from EPEL would not have received security updates since<br>October 2008. This update prevents the packages from EPEL from taking<br>precedence. (BZ#499079)<br>All users of java-1.6.0-openjdk are advised to upgrade to these updated<br>packages, which resolve these issues. All running instances of OpenJDK Java<br>must be restarted for the update to take effect.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/java | <1.6.0-openjdk-1.6.0.0-1.2.b09.el5 | 1.6.0-openjdk-1.6.0.0-1.2.b09.el5 |
redhat/java | <1.6.0-openjdk-1.6.0.0-1.2.b09.el5 | 1.6.0-openjdk-1.6.0.0-1.2.b09.el5 |
redhat/java | <1.6.0-openjdk-demo-1.6.0.0-1.2.b09.el5 | 1.6.0-openjdk-demo-1.6.0.0-1.2.b09.el5 |
redhat/java | <1.6.0-openjdk-devel-1.6.0.0-1.2.b09.el5 | 1.6.0-openjdk-devel-1.6.0.0-1.2.b09.el5 |
redhat/java | <1.6.0-openjdk-javadoc-1.6.0.0-1.2.b09.el5 | 1.6.0-openjdk-javadoc-1.6.0.0-1.2.b09.el5 |
redhat/java | <1.6.0-openjdk-src-1.6.0.0-1.2.b09.el5 | 1.6.0-openjdk-src-1.6.0.0-1.2.b09.el5 |
redhat/java | <1.6.0-openjdk-demo-1.6.0.0-1.2.b09.el5 | 1.6.0-openjdk-demo-1.6.0.0-1.2.b09.el5 |
redhat/java | <1.6.0-openjdk-devel-1.6.0.0-1.2.b09.el5 | 1.6.0-openjdk-devel-1.6.0.0-1.2.b09.el5 |
redhat/java | <1.6.0-openjdk-javadoc-1.6.0.0-1.2.b09.el5 | 1.6.0-openjdk-javadoc-1.6.0.0-1.2.b09.el5 |
redhat/java | <1.6.0-openjdk-src-1.6.0.0-1.2.b09.el5 | 1.6.0-openjdk-src-1.6.0.0-1.2.b09.el5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.