First published: Wed Oct 21 2015(Updated: )
The java-1.7.0-openjdk packages provide the OpenJDK 7 Java Runtime<br>Environment and the OpenJDK 7 Java Software Development Kit.<br>Multiple flaws were discovered in the CORBA, Libraries, RMI, Serialization,<br>and 2D components in OpenJDK. An untrusted Java application or applet could<br>use these flaws to completely bypass Java sandbox restrictions.<br>(CVE-2015-4835, CVE-2015-4881, CVE-2015-4843, CVE-2015-4883, CVE-2015-4860,<br>CVE-2015-4805, CVE-2015-4844)<br>Multiple denial of service flaws were found in the JAXP component in<br>OpenJDK. A specially crafted XML file could cause a Java application using<br>JAXP to consume an excessive amount of CPU and memory when parsed.<br>(CVE-2015-4803, CVE-2015-4893, CVE-2015-4911)<br>It was discovered that the Security component in OpenJDK failed to properly<br>check if a certificate satisfied all defined constraints. In certain cases,<br>this could cause a Java application to accept an X.509 certificate which<br>does not meet requirements of the defined policy. (CVE-2015-4872)<br>Multiple flaws were found in the Libraries, 2D, CORBA, JAXP, JGSS, and RMI<br>components in OpenJDK. An untrusted Java application or applet could use<br>these flaws to bypass certain Java sandbox restrictions. (CVE-2015-4806,<br>CVE-2015-4840, CVE-2015-4882, CVE-2015-4842, CVE-2015-4734, CVE-2015-4903)<br>Red Hat would like to thank Andrea Palazzo of Truel IT for reporting the<br>CVE-2015-4806 issue.<br>All users of java-1.7.0-openjdk are advised to upgrade to these updated<br>packages, which resolve these issues. All running instances of OpenJDK Java<br>must be restarted for the update to take effect.<br>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/java | <1.7.0-openjdk-1.7.0.91-2.6.2.1.el5_11 | 1.7.0-openjdk-1.7.0.91-2.6.2.1.el5_11 |
redhat/java | <1.7.0-openjdk-1.7.0.91-2.6.2.1.el5_11 | 1.7.0-openjdk-1.7.0.91-2.6.2.1.el5_11 |
redhat/java | <1.7.0-openjdk-debuginfo-1.7.0.91-2.6.2.1.el5_11 | 1.7.0-openjdk-debuginfo-1.7.0.91-2.6.2.1.el5_11 |
redhat/java | <1.7.0-openjdk-demo-1.7.0.91-2.6.2.1.el5_11 | 1.7.0-openjdk-demo-1.7.0.91-2.6.2.1.el5_11 |
redhat/java | <1.7.0-openjdk-devel-1.7.0.91-2.6.2.1.el5_11 | 1.7.0-openjdk-devel-1.7.0.91-2.6.2.1.el5_11 |
redhat/java | <1.7.0-openjdk-javadoc-1.7.0.91-2.6.2.1.el5_11 | 1.7.0-openjdk-javadoc-1.7.0.91-2.6.2.1.el5_11 |
redhat/java | <1.7.0-openjdk-src-1.7.0.91-2.6.2.1.el5_11 | 1.7.0-openjdk-src-1.7.0.91-2.6.2.1.el5_11 |
redhat/java | <1.7.0-openjdk-debuginfo-1.7.0.91-2.6.2.1.el5_11 | 1.7.0-openjdk-debuginfo-1.7.0.91-2.6.2.1.el5_11 |
redhat/java | <1.7.0-openjdk-demo-1.7.0.91-2.6.2.1.el5_11 | 1.7.0-openjdk-demo-1.7.0.91-2.6.2.1.el5_11 |
redhat/java | <1.7.0-openjdk-devel-1.7.0.91-2.6.2.1.el5_11 | 1.7.0-openjdk-devel-1.7.0.91-2.6.2.1.el5_11 |
redhat/java | <1.7.0-openjdk-javadoc-1.7.0.91-2.6.2.1.el5_11 | 1.7.0-openjdk-javadoc-1.7.0.91-2.6.2.1.el5_11 |
redhat/java | <1.7.0-openjdk-src-1.7.0.91-2.6.2.1.el5_11 | 1.7.0-openjdk-src-1.7.0.91-2.6.2.1.el5_11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability RHSA-2015:1921 is rated as critical due to multiple flaws in OpenJDK components.
To fix RHSA-2015:1921, upgrade to the fixed version 1.7.0-openjdk-1.7.0.91-2.6.2.1.el5_11.
RHSA-2015:1921 affects the CORBA, Libraries, RMI, Serialization, and 2D components in OpenJDK.
Exploiting RHSA-2015:1921 could allow an untrusted Java application to execute arbitrary code on the system.
Yes, RHSA-2015:1921 addresses critical security vulnerabilities within the OpenJDK implementation of Java.