First published: Wed Feb 20 2013(Updated: )
These packages provide the OpenJDK 7 Java Runtime Environment and the<br>OpenJDK 7 Software Development Kit.<br>Multiple improper permission check issues were discovered in the JMX and<br>Libraries components in OpenJDK. An untrusted Java application or applet<br>could use these flaws to bypass Java sandbox restrictions. (CVE-2013-1486,<br>CVE-2013-1484)<br>An improper permission check issue was discovered in the Libraries<br>component in OpenJDK. An untrusted Java application or applet could use<br>this flaw to bypass certain Java sandbox restrictions. (CVE-2013-1485)<br>It was discovered that OpenJDK leaked timing information when decrypting<br>TLS/SSL protocol encrypted records when CBC-mode cipher suites were used.<br>A remote attacker could possibly use this flaw to retrieve plain text from<br>the encrypted packets by using a TLS/SSL server as a padding oracle.<br>(CVE-2013-0169)<br>This erratum also upgrades the OpenJDK package to IcedTea7 2.3.7. Refer to<br>the NEWS file, linked to in the References, for further information.<br>All users of java-1.7.0-openjdk are advised to upgrade to these updated<br>packages, which resolve these issues. All running instances of OpenJDK Java<br>must be restarted for the update to take effect.<br>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/java | <1.7.0-openjdk-1.7.0.9-2.3.7.1.el6_3 | 1.7.0-openjdk-1.7.0.9-2.3.7.1.el6_3 |
redhat/java | <1.7.0-openjdk-1.7.0.9-2.3.7.1.el6_3 | 1.7.0-openjdk-1.7.0.9-2.3.7.1.el6_3 |
redhat/java | <1.7.0-openjdk-debuginfo-1.7.0.9-2.3.7.1.el6_3 | 1.7.0-openjdk-debuginfo-1.7.0.9-2.3.7.1.el6_3 |
redhat/java | <1.7.0-openjdk-demo-1.7.0.9-2.3.7.1.el6_3 | 1.7.0-openjdk-demo-1.7.0.9-2.3.7.1.el6_3 |
redhat/java | <1.7.0-openjdk-devel-1.7.0.9-2.3.7.1.el6_3 | 1.7.0-openjdk-devel-1.7.0.9-2.3.7.1.el6_3 |
redhat/java | <1.7.0-openjdk-javadoc-1.7.0.9-2.3.7.1.el6_3 | 1.7.0-openjdk-javadoc-1.7.0.9-2.3.7.1.el6_3 |
redhat/java | <1.7.0-openjdk-src-1.7.0.9-2.3.7.1.el6_3 | 1.7.0-openjdk-src-1.7.0.9-2.3.7.1.el6_3 |
redhat/java | <1.7.0-openjdk-debuginfo-1.7.0.9-2.3.7.1.el6_3 | 1.7.0-openjdk-debuginfo-1.7.0.9-2.3.7.1.el6_3 |
redhat/java | <1.7.0-openjdk-demo-1.7.0.9-2.3.7.1.el6_3 | 1.7.0-openjdk-demo-1.7.0.9-2.3.7.1.el6_3 |
redhat/java | <1.7.0-openjdk-devel-1.7.0.9-2.3.7.1.el6_3 | 1.7.0-openjdk-devel-1.7.0.9-2.3.7.1.el6_3 |
redhat/java | <1.7.0-openjdk-src-1.7.0.9-2.3.7.1.el6_3 | 1.7.0-openjdk-src-1.7.0.9-2.3.7.1.el6_3 |
redhat/java | <1.7.0-openjdk-1.7.0.9-2.3.7.1.el5_9 | 1.7.0-openjdk-1.7.0.9-2.3.7.1.el5_9 |
redhat/java | <1.7.0-openjdk-1.7.0.9-2.3.7.1.el5_9 | 1.7.0-openjdk-1.7.0.9-2.3.7.1.el5_9 |
redhat/java | <1.7.0-openjdk-debuginfo-1.7.0.9-2.3.7.1.el5_9 | 1.7.0-openjdk-debuginfo-1.7.0.9-2.3.7.1.el5_9 |
redhat/java | <1.7.0-openjdk-demo-1.7.0.9-2.3.7.1.el5_9 | 1.7.0-openjdk-demo-1.7.0.9-2.3.7.1.el5_9 |
redhat/java | <1.7.0-openjdk-devel-1.7.0.9-2.3.7.1.el5_9 | 1.7.0-openjdk-devel-1.7.0.9-2.3.7.1.el5_9 |
redhat/java | <1.7.0-openjdk-javadoc-1.7.0.9-2.3.7.1.el5_9 | 1.7.0-openjdk-javadoc-1.7.0.9-2.3.7.1.el5_9 |
redhat/java | <1.7.0-openjdk-src-1.7.0.9-2.3.7.1.el5_9 | 1.7.0-openjdk-src-1.7.0.9-2.3.7.1.el5_9 |
redhat/java | <1.7.0-openjdk-debuginfo-1.7.0.9-2.3.7.1.el5_9 | 1.7.0-openjdk-debuginfo-1.7.0.9-2.3.7.1.el5_9 |
redhat/java | <1.7.0-openjdk-demo-1.7.0.9-2.3.7.1.el5_9 | 1.7.0-openjdk-demo-1.7.0.9-2.3.7.1.el5_9 |
redhat/java | <1.7.0-openjdk-devel-1.7.0.9-2.3.7.1.el5_9 | 1.7.0-openjdk-devel-1.7.0.9-2.3.7.1.el5_9 |
redhat/java | <1.7.0-openjdk-javadoc-1.7.0.9-2.3.7.1.el5_9 | 1.7.0-openjdk-javadoc-1.7.0.9-2.3.7.1.el5_9 |
redhat/java | <1.7.0-openjdk-src-1.7.0.9-2.3.7.1.el5_9 | 1.7.0-openjdk-src-1.7.0.9-2.3.7.1.el5_9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.