First published: Wed Jul 03 2013(Updated: )
These packages provide the OpenJDK 6 Java Runtime Environment and the<br>OpenJDK 6 Software Development Kit.<br>Multiple flaws were discovered in the ImagingLib and the image attribute,<br>channel, layout and raster processing in the 2D component. An untrusted<br>Java application or applet could possibly use these flaws to trigger Java<br>Virtual Machine memory corruption. (CVE-2013-2470, CVE-2013-2471,<br>CVE-2013-2472, CVE-2013-2473, CVE-2013-2463, CVE-2013-2465, CVE-2013-2469)<br>Integer overflow flaws were found in the way AWT processed certain input.<br>An attacker could use these flaws to execute arbitrary code with the<br>privileges of the user running an untrusted Java applet or application.<br>(CVE-2013-2459)<br>Multiple improper permission check issues were discovered in the Sound and<br>JMX components in OpenJDK. An untrusted Java application or applet could<br>use these flaws to bypass Java sandbox restrictions. (CVE-2013-2448,<br>CVE-2013-2457, CVE-2013-2453)<br>Multiple flaws in the Serialization, Networking, Libraries and CORBA<br>components can be exploited by an untrusted Java application or applet to<br>gain access to potentially sensitive information. (CVE-2013-2456,<br>CVE-2013-2447, CVE-2013-2455, CVE-2013-2452, CVE-2013-2443, CVE-2013-2446)<br>It was discovered that the Hotspot component did not properly handle<br>out-of-memory errors. An untrusted Java application or applet could<br>possibly use these flaws to terminate the Java Virtual Machine.<br>(CVE-2013-2445)<br>It was discovered that the AWT component did not properly manage certain<br>resources and that the ObjectStreamClass of the Serialization component<br>did not properly handle circular references. An untrusted Java application<br>or applet could possibly use these flaws to cause a denial of service.<br>(CVE-2013-2444, CVE-2013-2450)<br>It was discovered that the Libraries component contained certain errors<br>related to XML security and the class loader. A remote attacker could<br>possibly exploit these flaws to bypass intended security mechanisms or<br>disclose potentially sensitive information and cause a denial of service.<br>(CVE-2013-2407, CVE-2013-2461)<br>It was discovered that JConsole did not properly inform the user when<br>establishing an SSL connection failed. An attacker could exploit this flaw<br>to gain access to potentially sensitive information. (CVE-2013-2412)<br>It was found that documentation generated by Javadoc was vulnerable to a<br>frame injection attack. If such documentation was accessible over a<br>network, and a remote attacker could trick a user into visiting a<br>specially-crafted URL, it would lead to arbitrary web content being<br>displayed next to the documentation. This could be used to perform a<br>phishing attack by providing frame content that spoofed a login form on<br>the site hosting the vulnerable documentation. (CVE-2013-1571)<br>It was discovered that the 2D component created shared memory segments with<br>insecure permissions. A local attacker could use this flaw to read or write<br>to the shared memory segment. (CVE-2013-1500)<br>Red Hat would like to thank US-CERT for reporting CVE-2013-1571, and Tim<br>Brown for reporting CVE-2013-1500. US-CERT acknowledges Oracle as the<br>original reporter of CVE-2013-1571.<br>All users of java-1.6.0-openjdk are advised to upgrade to these updated<br>packages, which resolve these issues. All running instances of OpenJDK Java<br>must be restarted for the update to take effect.<br>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/java | <1.6.0-openjdk-1.6.0.0-1.62.1.11.11.90.el6_4 | 1.6.0-openjdk-1.6.0.0-1.62.1.11.11.90.el6_4 |
redhat/java | <1.6.0-openjdk-1.6.0.0-1.62.1.11.11.90.el6_4 | 1.6.0-openjdk-1.6.0.0-1.62.1.11.11.90.el6_4 |
redhat/java | <1.6.0-openjdk-debuginfo-1.6.0.0-1.62.1.11.11.90.el6_4 | 1.6.0-openjdk-debuginfo-1.6.0.0-1.62.1.11.11.90.el6_4 |
redhat/java | <1.6.0-openjdk-demo-1.6.0.0-1.62.1.11.11.90.el6_4 | 1.6.0-openjdk-demo-1.6.0.0-1.62.1.11.11.90.el6_4 |
redhat/java | <1.6.0-openjdk-devel-1.6.0.0-1.62.1.11.11.90.el6_4 | 1.6.0-openjdk-devel-1.6.0.0-1.62.1.11.11.90.el6_4 |
redhat/java | <1.6.0-openjdk-javadoc-1.6.0.0-1.62.1.11.11.90.el6_4 | 1.6.0-openjdk-javadoc-1.6.0.0-1.62.1.11.11.90.el6_4 |
redhat/java | <1.6.0-openjdk-src-1.6.0.0-1.62.1.11.11.90.el6_4 | 1.6.0-openjdk-src-1.6.0.0-1.62.1.11.11.90.el6_4 |
redhat/java | <1.6.0-openjdk-debuginfo-1.6.0.0-1.62.1.11.11.90.el6_4 | 1.6.0-openjdk-debuginfo-1.6.0.0-1.62.1.11.11.90.el6_4 |
redhat/java | <1.6.0-openjdk-demo-1.6.0.0-1.62.1.11.11.90.el6_4 | 1.6.0-openjdk-demo-1.6.0.0-1.62.1.11.11.90.el6_4 |
redhat/java | <1.6.0-openjdk-devel-1.6.0.0-1.62.1.11.11.90.el6_4 | 1.6.0-openjdk-devel-1.6.0.0-1.62.1.11.11.90.el6_4 |
redhat/java | <1.6.0-openjdk-javadoc-1.6.0.0-1.62.1.11.11.90.el6_4 | 1.6.0-openjdk-javadoc-1.6.0.0-1.62.1.11.11.90.el6_4 |
redhat/java | <1.6.0-openjdk-src-1.6.0.0-1.62.1.11.11.90.el6_4 | 1.6.0-openjdk-src-1.6.0.0-1.62.1.11.11.90.el6_4 |
redhat/java | <1.6.0-openjdk-1.6.0.0-1.41.1.11.11.90.el5_9 | 1.6.0-openjdk-1.6.0.0-1.41.1.11.11.90.el5_9 |
redhat/java | <1.6.0-openjdk-1.6.0.0-1.41.1.11.11.90.el5_9 | 1.6.0-openjdk-1.6.0.0-1.41.1.11.11.90.el5_9 |
redhat/java | <1.6.0-openjdk-debuginfo-1.6.0.0-1.41.1.11.11.90.el5_9 | 1.6.0-openjdk-debuginfo-1.6.0.0-1.41.1.11.11.90.el5_9 |
redhat/java | <1.6.0-openjdk-demo-1.6.0.0-1.41.1.11.11.90.el5_9 | 1.6.0-openjdk-demo-1.6.0.0-1.41.1.11.11.90.el5_9 |
redhat/java | <1.6.0-openjdk-devel-1.6.0.0-1.41.1.11.11.90.el5_9 | 1.6.0-openjdk-devel-1.6.0.0-1.41.1.11.11.90.el5_9 |
redhat/java | <1.6.0-openjdk-javadoc-1.6.0.0-1.41.1.11.11.90.el5_9 | 1.6.0-openjdk-javadoc-1.6.0.0-1.41.1.11.11.90.el5_9 |
redhat/java | <1.6.0-openjdk-src-1.6.0.0-1.41.1.11.11.90.el5_9 | 1.6.0-openjdk-src-1.6.0.0-1.41.1.11.11.90.el5_9 |
redhat/java | <1.6.0-openjdk-debuginfo-1.6.0.0-1.41.1.11.11.90.el5_9 | 1.6.0-openjdk-debuginfo-1.6.0.0-1.41.1.11.11.90.el5_9 |
redhat/java | <1.6.0-openjdk-demo-1.6.0.0-1.41.1.11.11.90.el5_9 | 1.6.0-openjdk-demo-1.6.0.0-1.41.1.11.11.90.el5_9 |
redhat/java | <1.6.0-openjdk-devel-1.6.0.0-1.41.1.11.11.90.el5_9 | 1.6.0-openjdk-devel-1.6.0.0-1.41.1.11.11.90.el5_9 |
redhat/java | <1.6.0-openjdk-javadoc-1.6.0.0-1.41.1.11.11.90.el5_9 | 1.6.0-openjdk-javadoc-1.6.0.0-1.41.1.11.11.90.el5_9 |
redhat/java | <1.6.0-openjdk-src-1.6.0.0-1.41.1.11.11.90.el5_9 | 1.6.0-openjdk-src-1.6.0.0-1.41.1.11.11.90.el5_9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.