First published: Wed Jun 19 2013(Updated: )
These packages provide the OpenJDK 7 Java Runtime Environment and the<br>OpenJDK 7 Software Development Kit.<br>Multiple flaws were discovered in the ImagingLib and the image attribute,<br>channel, layout and raster processing in the 2D component. An untrusted<br>Java application or applet could possibly use these flaws to trigger Java<br>Virtual Machine memory corruption. (CVE-2013-2470, CVE-2013-2471,<br>CVE-2013-2472, CVE-2013-2473, CVE-2013-2463, CVE-2013-2465, CVE-2013-2469)<br>Integer overflow flaws were found in the way AWT processed certain input.<br>An attacker could use these flaws to execute arbitrary code with the<br>privileges of the user running an untrusted Java applet or application.<br>(CVE-2013-2459)<br>Multiple improper permission check issues were discovered in the Sound,<br>JDBC, Libraries, JMX, and Serviceability components in OpenJDK. An<br>untrusted Java application or applet could use these flaws to bypass Java<br>sandbox restrictions. (CVE-2013-2448, CVE-2013-2454, CVE-2013-2458,<br>CVE-2013-2457, CVE-2013-2453, CVE-2013-2460)<br>Multiple flaws in the Serialization, Networking, Libraries and CORBA<br>components can be exploited by an untrusted Java application or applet to<br>gain access to potentially sensitive information. (CVE-2013-2456,<br>CVE-2013-2447, CVE-2013-2455, CVE-2013-2452, CVE-2013-2443, CVE-2013-2446)<br>It was discovered that the Hotspot component did not properly handle<br>out-of-memory errors. An untrusted Java application or applet could<br>possibly use these flaws to terminate the Java Virtual Machine.<br>(CVE-2013-2445)<br>It was discovered that the AWT component did not properly manage certain<br>resources and that the ObjectStreamClass of the Serialization component<br>did not properly handle circular references. An untrusted Java application<br>or applet could possibly use these flaws to cause a denial of service.<br>(CVE-2013-2444, CVE-2013-2450)<br>It was discovered that the Libraries component contained certain errors<br>related to XML security and the class loader. A remote attacker could<br>possibly exploit these flaws to bypass intended security mechanisms or<br>disclose potentially sensitive information and cause a denial of service.<br>(CVE-2013-2407, CVE-2013-2461)<br>It was discovered that JConsole did not properly inform the user when<br>establishing an SSL connection failed. An attacker could exploit this flaw<br>to gain access to potentially sensitive information. (CVE-2013-2412)<br>It was discovered that GnomeFileTypeDetector did not check for read<br>permissions when accessing files. An untrusted Java application or applet<br>could possibly use this flaw to disclose potentially sensitive information.<br>(CVE-2013-2449)<br>It was found that documentation generated by Javadoc was vulnerable to a<br>frame injection attack. If such documentation was accessible over a<br>network, and a remote attacker could trick a user into visiting a<br>specially-crafted URL, it would lead to arbitrary web content being<br>displayed next to the documentation. This could be used to perform a<br>phishing attack by providing frame content that spoofed a login form on<br>the site hosting the vulnerable documentation. (CVE-2013-1571)<br>It was discovered that the 2D component created shared memory segments with<br>insecure permissions. A local attacker could use this flaw to read or write<br>to the shared memory segment. (CVE-2013-1500)<br>Red Hat would like to thank Tim Brown for reporting CVE-2013-1500, and<br>US-CERT for reporting CVE-2013-1571. US-CERT acknowledges Oracle as the<br>original reporter of CVE-2013-1571.<br>This erratum also upgrades the OpenJDK package to IcedTea7 2.3.10. Refer to<br>the NEWS file, linked to in the References, for further information.<br>All users of java-1.7.0-openjdk are advised to upgrade to these updated<br>packages, which resolve these issues. All running instances of OpenJDK Java<br>must be restarted for the update to take effect.<br>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/java | <1.7.0-openjdk-1.7.0.25-2.3.10.4.el5_9 | 1.7.0-openjdk-1.7.0.25-2.3.10.4.el5_9 |
redhat/java | <1.7.0-openjdk-1.7.0.25-2.3.10.4.el5_9 | 1.7.0-openjdk-1.7.0.25-2.3.10.4.el5_9 |
redhat/java | <1.7.0-openjdk-debuginfo-1.7.0.25-2.3.10.4.el5_9 | 1.7.0-openjdk-debuginfo-1.7.0.25-2.3.10.4.el5_9 |
redhat/java | <1.7.0-openjdk-demo-1.7.0.25-2.3.10.4.el5_9 | 1.7.0-openjdk-demo-1.7.0.25-2.3.10.4.el5_9 |
redhat/java | <1.7.0-openjdk-devel-1.7.0.25-2.3.10.4.el5_9 | 1.7.0-openjdk-devel-1.7.0.25-2.3.10.4.el5_9 |
redhat/java | <1.7.0-openjdk-javadoc-1.7.0.25-2.3.10.4.el5_9 | 1.7.0-openjdk-javadoc-1.7.0.25-2.3.10.4.el5_9 |
redhat/java | <1.7.0-openjdk-src-1.7.0.25-2.3.10.4.el5_9 | 1.7.0-openjdk-src-1.7.0.25-2.3.10.4.el5_9 |
redhat/java | <1.7.0-openjdk-debuginfo-1.7.0.25-2.3.10.4.el5_9 | 1.7.0-openjdk-debuginfo-1.7.0.25-2.3.10.4.el5_9 |
redhat/java | <1.7.0-openjdk-demo-1.7.0.25-2.3.10.4.el5_9 | 1.7.0-openjdk-demo-1.7.0.25-2.3.10.4.el5_9 |
redhat/java | <1.7.0-openjdk-devel-1.7.0.25-2.3.10.4.el5_9 | 1.7.0-openjdk-devel-1.7.0.25-2.3.10.4.el5_9 |
redhat/java | <1.7.0-openjdk-javadoc-1.7.0.25-2.3.10.4.el5_9 | 1.7.0-openjdk-javadoc-1.7.0.25-2.3.10.4.el5_9 |
redhat/java | <1.7.0-openjdk-src-1.7.0.25-2.3.10.4.el5_9 | 1.7.0-openjdk-src-1.7.0.25-2.3.10.4.el5_9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.