First published: Wed Feb 20 2013(Updated: )
These packages provide the OpenJDK 6 Java Runtime Environment and the<br>OpenJDK 6 Software Development Kit.<br>An improper permission check issue was discovered in the JMX component in<br>OpenJDK. An untrusted Java application or applet could use this flaw to<br>bypass Java sandbox restrictions. (CVE-2013-1486)<br>It was discovered that OpenJDK leaked timing information when decrypting<br>TLS/SSL protocol encrypted records when CBC-mode cipher suites were used.<br>A remote attacker could possibly use this flaw to retrieve plain text from<br>the encrypted packets by using a TLS/SSL server as a padding oracle.<br>(CVE-2013-0169)<br>Note: If the web browser plug-in provided by the icedtea-web package was<br>installed, CVE-2013-1486 could have been exploited without user interaction<br>if a user visited a malicious website.<br>This erratum also upgrades the OpenJDK package to IcedTea6 1.11.8. Refer to<br>the NEWS file, linked to in the References, for further information.<br>All users of java-1.6.0-openjdk are advised to upgrade to these updated<br>packages, which resolve these issues. All running instances of OpenJDK Java<br>must be restarted for the update to take effect.<br>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/java | <1.6.0-openjdk-1.6.0.0-1.56.1.11.8.el6_3 | 1.6.0-openjdk-1.6.0.0-1.56.1.11.8.el6_3 |
redhat/java | <1.6.0-openjdk-1.6.0.0-1.56.1.11.8.el6_3 | 1.6.0-openjdk-1.6.0.0-1.56.1.11.8.el6_3 |
redhat/java | <1.6.0-openjdk-debuginfo-1.6.0.0-1.56.1.11.8.el6_3 | 1.6.0-openjdk-debuginfo-1.6.0.0-1.56.1.11.8.el6_3 |
redhat/java | <1.6.0-openjdk-demo-1.6.0.0-1.56.1.11.8.el6_3 | 1.6.0-openjdk-demo-1.6.0.0-1.56.1.11.8.el6_3 |
redhat/java | <1.6.0-openjdk-devel-1.6.0.0-1.56.1.11.8.el6_3 | 1.6.0-openjdk-devel-1.6.0.0-1.56.1.11.8.el6_3 |
redhat/java | <1.6.0-openjdk-javadoc-1.6.0.0-1.56.1.11.8.el6_3 | 1.6.0-openjdk-javadoc-1.6.0.0-1.56.1.11.8.el6_3 |
redhat/java | <1.6.0-openjdk-src-1.6.0.0-1.56.1.11.8.el6_3 | 1.6.0-openjdk-src-1.6.0.0-1.56.1.11.8.el6_3 |
redhat/java | <1.6.0-openjdk-debuginfo-1.6.0.0-1.56.1.11.8.el6_3 | 1.6.0-openjdk-debuginfo-1.6.0.0-1.56.1.11.8.el6_3 |
redhat/java | <1.6.0-openjdk-demo-1.6.0.0-1.56.1.11.8.el6_3 | 1.6.0-openjdk-demo-1.6.0.0-1.56.1.11.8.el6_3 |
redhat/java | <1.6.0-openjdk-devel-1.6.0.0-1.56.1.11.8.el6_3 | 1.6.0-openjdk-devel-1.6.0.0-1.56.1.11.8.el6_3 |
redhat/java | <1.6.0-openjdk-javadoc-1.6.0.0-1.56.1.11.8.el6_3 | 1.6.0-openjdk-javadoc-1.6.0.0-1.56.1.11.8.el6_3 |
redhat/java | <1.6.0-openjdk-src-1.6.0.0-1.56.1.11.8.el6_3 | 1.6.0-openjdk-src-1.6.0.0-1.56.1.11.8.el6_3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2013:0273 is classified as critical.
To fix RHSA-2013:0273, you should update to the fixed version of OpenJDK 6 as specified in the advisory.
RHSA-2013:0273 affects systems running vulnerable versions of OpenJDK 6 packages.
RHSA-2013:0273 is associated with an improper permission check in the JMX component of OpenJDK.
Yes, an untrusted Java application could exploit RHSA-2013:0273 to bypass the Java sandbox.