First published: Wed Jun 13 2012(Updated: )
These packages provide the OpenJDK 6 Java Runtime Environment and the<br>OpenJDK 6 Software Development Kit.<br>Multiple flaws were discovered in the CORBA (Common Object Request Broker<br>Architecture) implementation in Java. A malicious Java application or<br>applet could use these flaws to bypass Java sandbox restrictions or modify<br>immutable object data. (CVE-2012-1711, CVE-2012-1719)<br>It was discovered that the SynthLookAndFeel class from Swing did not<br>properly prevent access to certain UI elements from outside the current<br>application context. A malicious Java application or applet could use this<br>flaw to crash the Java Virtual Machine, or bypass Java sandbox<br>restrictions. (CVE-2012-1716)<br>Multiple flaws were discovered in the font manager's layout lookup<br>implementation. A specially-crafted font file could cause the Java Virtual<br>Machine to crash or, possibly, execute arbitrary code with the privileges<br>of the user running the virtual machine. (CVE-2012-1713)<br>Multiple flaws were found in the way the Java HotSpot Virtual Machine<br>verified the bytecode of the class file to be executed. A specially-crafted<br>Java application or applet could use these flaws to crash the Java Virtual<br>Machine, or bypass Java sandbox restrictions. (CVE-2012-1723,<br>CVE-2012-1725)<br>It was discovered that the Java XML parser did not properly handle certain<br>XML documents. An attacker able to make a Java application parse a<br>specially-crafted XML file could use this flaw to make the XML parser enter<br>an infinite loop. (CVE-2012-1724)<br>It was discovered that the Java security classes did not properly handle<br>Certificate Revocation Lists (CRL). CRL containing entries with duplicate<br>certificate serial numbers could have been ignored. (CVE-2012-1718)<br>It was discovered that various classes of the Java Runtime library could<br>create temporary files with insecure permissions. A local attacker could<br>use this flaw to gain access to the content of such temporary files.<br>(CVE-2012-1717)<br>Note: If the web browser plug-in provided by the icedtea-web package was<br>installed, the issues exposed via Java applets could have been exploited<br>without user interaction if a user visited a malicious website.<br>This erratum also upgrades the OpenJDK package to IcedTea6 1.11.3. Refer to<br>the NEWS file, linked to in the References, for further information.<br>All users of java-1.6.0-openjdk are advised to upgrade to these updated<br>packages, which resolve these issues. All running instances of OpenJDK Java<br>must be restarted for the update to take effect.<br>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/java | <1.6.0-openjdk-1.6.0.0-1.48.1.11.3.el6_2 | 1.6.0-openjdk-1.6.0.0-1.48.1.11.3.el6_2 |
redhat/java | <1.6.0-openjdk-1.6.0.0-1.48.1.11.3.el6_2 | 1.6.0-openjdk-1.6.0.0-1.48.1.11.3.el6_2 |
redhat/java | <1.6.0-openjdk-debuginfo-1.6.0.0-1.48.1.11.3.el6_2 | 1.6.0-openjdk-debuginfo-1.6.0.0-1.48.1.11.3.el6_2 |
redhat/java | <1.6.0-openjdk-demo-1.6.0.0-1.48.1.11.3.el6_2 | 1.6.0-openjdk-demo-1.6.0.0-1.48.1.11.3.el6_2 |
redhat/java | <1.6.0-openjdk-devel-1.6.0.0-1.48.1.11.3.el6_2 | 1.6.0-openjdk-devel-1.6.0.0-1.48.1.11.3.el6_2 |
redhat/java | <1.6.0-openjdk-javadoc-1.6.0.0-1.48.1.11.3.el6_2 | 1.6.0-openjdk-javadoc-1.6.0.0-1.48.1.11.3.el6_2 |
redhat/java | <1.6.0-openjdk-src-1.6.0.0-1.48.1.11.3.el6_2 | 1.6.0-openjdk-src-1.6.0.0-1.48.1.11.3.el6_2 |
redhat/java | <1.6.0-openjdk-debuginfo-1.6.0.0-1.48.1.11.3.el6_2 | 1.6.0-openjdk-debuginfo-1.6.0.0-1.48.1.11.3.el6_2 |
redhat/java | <1.6.0-openjdk-demo-1.6.0.0-1.48.1.11.3.el6_2 | 1.6.0-openjdk-demo-1.6.0.0-1.48.1.11.3.el6_2 |
redhat/java | <1.6.0-openjdk-devel-1.6.0.0-1.48.1.11.3.el6_2 | 1.6.0-openjdk-devel-1.6.0.0-1.48.1.11.3.el6_2 |
redhat/java | <1.6.0-openjdk-javadoc-1.6.0.0-1.48.1.11.3.el6_2 | 1.6.0-openjdk-javadoc-1.6.0.0-1.48.1.11.3.el6_2 |
redhat/java | <1.6.0-openjdk-src-1.6.0.0-1.48.1.11.3.el6_2 | 1.6.0-openjdk-src-1.6.0.0-1.48.1.11.3.el6_2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.