Advisory Published

RHSA-2012:0730: Important: java-1.6.0-openjdk security update

First published: Wed Jun 13 2012(Updated: )

These packages provide the OpenJDK 6 Java Runtime Environment and the<br>OpenJDK 6 Software Development Kit.<br>Multiple flaws were discovered in the CORBA (Common Object Request Broker<br>Architecture) implementation in Java. A malicious Java application or<br>applet could use these flaws to bypass Java sandbox restrictions or modify<br>immutable object data. (CVE-2012-1711, CVE-2012-1719)<br>It was discovered that the SynthLookAndFeel class from Swing did not<br>properly prevent access to certain UI elements from outside the current<br>application context. A malicious Java application or applet could use this<br>flaw to crash the Java Virtual Machine, or bypass Java sandbox<br>restrictions. (CVE-2012-1716)<br>Multiple flaws were discovered in the font manager's layout lookup<br>implementation. A specially-crafted font file could cause the Java Virtual<br>Machine to crash or, possibly, execute arbitrary code with the privileges<br>of the user running the virtual machine. (CVE-2012-1713)<br>Multiple flaws were found in the way the Java HotSpot Virtual Machine<br>verified the bytecode of the class file to be executed. A specially-crafted<br>Java application or applet could use these flaws to crash the Java Virtual<br>Machine, or bypass Java sandbox restrictions. (CVE-2012-1723,<br>CVE-2012-1725)<br>It was discovered that the Java XML parser did not properly handle certain<br>XML documents. An attacker able to make a Java application parse a<br>specially-crafted XML file could use this flaw to make the XML parser enter<br>an infinite loop. (CVE-2012-1724)<br>It was discovered that the Java security classes did not properly handle<br>Certificate Revocation Lists (CRL). CRL containing entries with duplicate<br>certificate serial numbers could have been ignored. (CVE-2012-1718)<br>It was discovered that various classes of the Java Runtime library could<br>create temporary files with insecure permissions. A local attacker could<br>use this flaw to gain access to the content of such temporary files.<br>(CVE-2012-1717)<br>This erratum also upgrades the OpenJDK package to IcedTea6 1.10.8. Refer to<br>the NEWS file, linked to in the References, for further information.<br>All users of java-1.6.0-openjdk are advised to upgrade to these updated<br>packages, which resolve these issues. All running instances of OpenJDK Java<br>must be restarted for the update to take effect.<br>

Affected SoftwareAffected VersionHow to fix
redhat/java<1.6.0-openjdk-1.6.0.0-1.27.1.10.8.el5_8
1.6.0-openjdk-1.6.0.0-1.27.1.10.8.el5_8
redhat/java<1.6.0-openjdk-1.6.0.0-1.27.1.10.8.el5_8
1.6.0-openjdk-1.6.0.0-1.27.1.10.8.el5_8
redhat/java<1.6.0-openjdk-debuginfo-1.6.0.0-1.27.1.10.8.el5_8
1.6.0-openjdk-debuginfo-1.6.0.0-1.27.1.10.8.el5_8
redhat/java<1.6.0-openjdk-demo-1.6.0.0-1.27.1.10.8.el5_8
1.6.0-openjdk-demo-1.6.0.0-1.27.1.10.8.el5_8
redhat/java<1.6.0-openjdk-devel-1.6.0.0-1.27.1.10.8.el5_8
1.6.0-openjdk-devel-1.6.0.0-1.27.1.10.8.el5_8
redhat/java<1.6.0-openjdk-javadoc-1.6.0.0-1.27.1.10.8.el5_8
1.6.0-openjdk-javadoc-1.6.0.0-1.27.1.10.8.el5_8
redhat/java<1.6.0-openjdk-src-1.6.0.0-1.27.1.10.8.el5_8
1.6.0-openjdk-src-1.6.0.0-1.27.1.10.8.el5_8
redhat/java<1.6.0-openjdk-debuginfo-1.6.0.0-1.27.1.10.8.el5_8
1.6.0-openjdk-debuginfo-1.6.0.0-1.27.1.10.8.el5_8
redhat/java<1.6.0-openjdk-demo-1.6.0.0-1.27.1.10.8.el5_8
1.6.0-openjdk-demo-1.6.0.0-1.27.1.10.8.el5_8
redhat/java<1.6.0-openjdk-devel-1.6.0.0-1.27.1.10.8.el5_8
1.6.0-openjdk-devel-1.6.0.0-1.27.1.10.8.el5_8
redhat/java<1.6.0-openjdk-javadoc-1.6.0.0-1.27.1.10.8.el5_8
1.6.0-openjdk-javadoc-1.6.0.0-1.27.1.10.8.el5_8
redhat/java<1.6.0-openjdk-src-1.6.0.0-1.27.1.10.8.el5_8
1.6.0-openjdk-src-1.6.0.0-1.27.1.10.8.el5_8

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203