First published: Thu Jan 21 2016(Updated: )
The java-1.7.0-openjdk packages provide the OpenJDK 7 Java Runtime<br>Environment and the OpenJDK 7 Java Software Development Kit.<br>An out-of-bounds write flaw was found in the JPEG image format decoder in<br>the AWT component in OpenJDK. A specially crafted JPEG image could cause<br>a Java application to crash or, possibly execute arbitrary code. An<br>untrusted Java application or applet could use this flaw to bypass Java<br>sandbox restrictions. (CVE-2016-0483)<br>An integer signedness issue was found in the font parsing code in the 2D<br>component in OpenJDK. A specially crafted font file could possibly cause<br>the Java Virtual Machine to execute arbitrary code, allowing an untrusted<br>Java application or applet to bypass Java sandbox restrictions.<br>(CVE-2016-0494)<br>It was discovered that the JAXP component in OpenJDK did not properly<br>enforce the totalEntitySizeLimit limit. An attacker able to make a Java<br>application process a specially crafted XML file could use this flaw to<br>make the application consume an excessive amount of memory. (CVE-2016-0466)<br>A flaw was found in the way TLS 1.2 could use the MD5 hash function for<br>signing ServerKeyExchange and Client Authentication packets during a TLS<br>handshake. A man-in-the-middle attacker able to force a TLS connection to<br>use the MD5 hash function could use this flaw to conduct collision attacks<br>to impersonate a TLS server or an authenticated TLS client. (CVE-2015-7575)<br>Multiple flaws were discovered in the Libraries, Networking, and JMX<br>components in OpenJDK. An untrusted Java application or applet could use<br>these flaws to bypass certain Java sandbox restrictions. (CVE-2015-4871,<br>CVE-2016-0402, CVE-2016-0448)<br>Note: If the web browser plug-in provided by the icedtea-web package was<br>installed, the issues exposed via Java applets could have been exploited<br>without user interaction if a user visited a malicious website.<br>Note: This update also disallows the use of the MD5 hash algorithm in the<br>certification path processing. The use of MD5 can be re-enabled by removing<br>MD5 from the jdk.certpath.disabledAlgorithms security property defined in<br>the java.security file.<br>All users of java-1.7.0-openjdk are advised to upgrade to these updated<br>packages, which resolve these issues. All running instances of OpenJDK Java<br>must be restarted for the update to take effect.<br>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/java | <1.7.0-openjdk-1.7.0.95-2.6.4.0.el6_7 | 1.7.0-openjdk-1.7.0.95-2.6.4.0.el6_7 |
redhat/java | <1.7.0-openjdk-1.7.0.95-2.6.4.0.el6_7 | 1.7.0-openjdk-1.7.0.95-2.6.4.0.el6_7 |
redhat/java | <1.7.0-openjdk-debuginfo-1.7.0.95-2.6.4.0.el6_7 | 1.7.0-openjdk-debuginfo-1.7.0.95-2.6.4.0.el6_7 |
redhat/java | <1.7.0-openjdk-demo-1.7.0.95-2.6.4.0.el6_7 | 1.7.0-openjdk-demo-1.7.0.95-2.6.4.0.el6_7 |
redhat/java | <1.7.0-openjdk-devel-1.7.0.95-2.6.4.0.el6_7 | 1.7.0-openjdk-devel-1.7.0.95-2.6.4.0.el6_7 |
redhat/java | <1.7.0-openjdk-javadoc-1.7.0.95-2.6.4.0.el6_7 | 1.7.0-openjdk-javadoc-1.7.0.95-2.6.4.0.el6_7 |
redhat/java | <1.7.0-openjdk-src-1.7.0.95-2.6.4.0.el6_7 | 1.7.0-openjdk-src-1.7.0.95-2.6.4.0.el6_7 |
redhat/java | <1.7.0-openjdk-debuginfo-1.7.0.95-2.6.4.0.el6_7 | 1.7.0-openjdk-debuginfo-1.7.0.95-2.6.4.0.el6_7 |
redhat/java | <1.7.0-openjdk-demo-1.7.0.95-2.6.4.0.el6_7 | 1.7.0-openjdk-demo-1.7.0.95-2.6.4.0.el6_7 |
redhat/java | <1.7.0-openjdk-devel-1.7.0.95-2.6.4.0.el6_7 | 1.7.0-openjdk-devel-1.7.0.95-2.6.4.0.el6_7 |
redhat/java | <1.7.0-openjdk-src-1.7.0.95-2.6.4.0.el6_7 | 1.7.0-openjdk-src-1.7.0.95-2.6.4.0.el6_7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.