First published: Wed Jun 20 2012(Updated: )
These packages provide the OpenJDK 7 Java Runtime Environment and the<br>OpenJDK 7 Software Development Kit.<br>Multiple flaws were discovered in the CORBA (Common Object Request Broker<br>Architecture) implementation in Java. A malicious Java application or<br>applet could use these flaws to bypass Java sandbox restrictions or modify<br>immutable object data. (CVE-2012-1711, CVE-2012-1719)<br>It was discovered that the SynthLookAndFeel class from Swing did not<br>properly prevent access to certain UI elements from outside the current<br>application context. A malicious Java application or applet could use this<br>flaw to crash the Java Virtual Machine, or bypass Java sandbox<br>restrictions. (CVE-2012-1716)<br>Multiple flaws were discovered in the font manager's layout lookup<br>implementation. A specially-crafted font file could cause the Java Virtual<br>Machine to crash or, possibly, execute arbitrary code with the privileges<br>of the user running the virtual machine. (CVE-2012-1713)<br>Multiple flaws were found in the way the Java HotSpot Virtual Machine<br>verified the bytecode of the class file to be executed. A specially-crafted<br>Java application or applet could use these flaws to crash the Java Virtual<br>Machine, or bypass Java sandbox restrictions. (CVE-2012-1723,<br>CVE-2012-1725)<br>It was discovered that java.lang.invoke.MethodHandles.Lookup did not<br>properly honor access modes. An untrusted Java application or applet could<br>use this flaw to bypass Java sandbox restrictions. (CVE-2012-1726)<br>It was discovered that the Java XML parser did not properly handle certain<br>XML documents. An attacker able to make a Java application parse a<br>specially-crafted XML file could use this flaw to make the XML parser enter<br>an infinite loop. (CVE-2012-1724)<br>It was discovered that the Java security classes did not properly handle<br>Certificate Revocation Lists (CRL). CRL containing entries with duplicate<br>certificate serial numbers could have been ignored. (CVE-2012-1718)<br>It was discovered that various classes of the Java Runtime library could<br>create temporary files with insecure permissions. A local attacker could<br>use this flaw to gain access to the content of such temporary files.<br>(CVE-2012-1717)<br>This update also fixes the following bug:<br><li> Attempting to compile a SystemTap script using the jstack tapset could</li> have failed with an error similar to the following:<br>error: the frame size of 272 bytes is larger than 256 bytes<br>This update corrects the jstack tapset and resolves this issue. (BZ#833035)<br>This erratum also upgrades the OpenJDK package to IcedTea7 2.2.1. Refer to<br>the NEWS file, linked to in the References, for further information.<br>All users of java-1.7.0-openjdk are advised to upgrade to these updated<br>packages, which resolve these issues. All running instances of OpenJDK Java<br>must be restarted for the update to take effect.<br>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/java | <1.7.0-openjdk-1.7.0.5-2.2.1.el6_3 | 1.7.0-openjdk-1.7.0.5-2.2.1.el6_3 |
redhat/java | <1.7.0-openjdk-1.7.0.5-2.2.1.el6_3 | 1.7.0-openjdk-1.7.0.5-2.2.1.el6_3 |
redhat/java | <1.7.0-openjdk-debuginfo-1.7.0.5-2.2.1.el6_3 | 1.7.0-openjdk-debuginfo-1.7.0.5-2.2.1.el6_3 |
redhat/java | <1.7.0-openjdk-demo-1.7.0.5-2.2.1.el6_3 | 1.7.0-openjdk-demo-1.7.0.5-2.2.1.el6_3 |
redhat/java | <1.7.0-openjdk-devel-1.7.0.5-2.2.1.el6_3 | 1.7.0-openjdk-devel-1.7.0.5-2.2.1.el6_3 |
redhat/java | <1.7.0-openjdk-javadoc-1.7.0.5-2.2.1.el6_3 | 1.7.0-openjdk-javadoc-1.7.0.5-2.2.1.el6_3 |
redhat/java | <1.7.0-openjdk-src-1.7.0.5-2.2.1.el6_3 | 1.7.0-openjdk-src-1.7.0.5-2.2.1.el6_3 |
redhat/java | <1.7.0-openjdk-debuginfo-1.7.0.5-2.2.1.el6_3 | 1.7.0-openjdk-debuginfo-1.7.0.5-2.2.1.el6_3 |
redhat/java | <1.7.0-openjdk-demo-1.7.0.5-2.2.1.el6_3 | 1.7.0-openjdk-demo-1.7.0.5-2.2.1.el6_3 |
redhat/java | <1.7.0-openjdk-devel-1.7.0.5-2.2.1.el6_3 | 1.7.0-openjdk-devel-1.7.0.5-2.2.1.el6_3 |
redhat/java | <1.7.0-openjdk-src-1.7.0.5-2.2.1.el6_3 | 1.7.0-openjdk-src-1.7.0.5-2.2.1.el6_3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.