Oval Definition:oval:com.redhat.rhsa:def:20121009
Revision Date:2012-06-20Version:634
Title:RHSA-2012:1009: java-1.7.0-openjdk security and bug fix update (Important)
Description:These packages provide the OpenJDK 7 Java Runtime Environment and the OpenJDK 7 Software Development Kit.

  • Multiple flaws were discovered in the CORBA (Common Object Request Broker Architecture) implementation in Java. A malicious Java application or applet could use these flaws to bypass Java sandbox restrictions or modify immutable object data. (CVE-2012-1711, CVE-2012-1719)

  • It was discovered that the SynthLookAndFeel class from Swing did not properly prevent access to certain UI elements from outside the current application context. A malicious Java application or applet could use this flaw to crash the Java Virtual Machine, or bypass Java sandbox restrictions. (CVE-2012-1716)

  • Multiple flaws were discovered in the font manager's layout lookup implementation. A specially-crafted font file could cause the Java Virtual Machine to crash or, possibly, execute arbitrary code with the privileges of the user running the virtual machine. (CVE-2012-1713)

  • Multiple flaws were found in the way the Java HotSpot Virtual Machine verified the bytecode of the class file to be executed. A specially-crafted Java application or applet could use these flaws to crash the Java Virtual Machine, or bypass Java sandbox restrictions. (CVE-2012-1723, CVE-2012-1725)

  • It was discovered that java.lang.invoke.MethodHandles.Lookup did not properly honor access modes. An untrusted Java application or applet could use this flaw to bypass Java sandbox restrictions. (CVE-2012-1726)

  • It was discovered that the Java XML parser did not properly handle certain XML documents. An attacker able to make a Java application parse a specially-crafted XML file could use this flaw to make the XML parser enter an infinite loop. (CVE-2012-1724)

  • It was discovered that the Java security classes did not properly handle Certificate Revocation Lists (CRL). CRL containing entries with duplicate certificate serial numbers could have been ignored. (CVE-2012-1718)

  • It was discovered that various classes of the Java Runtime library could create temporary files with insecure permissions. A local attacker could use this flaw to gain access to the content of such temporary files. (CVE-2012-1717)

    This update also fixes the following bug:

    Attempting to compile a SystemTap script using the jstack tapset could have failed with an error similar to the following:

    error: the frame size of 272 bytes is larger than 256 bytes

  • This update corrects the jstack tapset and resolves this issue. (BZ#833035)

    This erratum also upgrades the OpenJDK package to IcedTea7 2.2.1. Refer to the NEWS file, linked to in the References, for further information.

    All users of java-1.7.0-openjdk are advised to upgrade to these updated packages, which resolve these issues. All running instances of OpenJDK Java must be restarted for the update to take effect.
  • Family:unixClass:patch
    Status:Reference(s):CVE-2012-1711
    CVE-2012-1711
    CVE-2012-1713
    CVE-2012-1713
    CVE-2012-1716
    CVE-2012-1716
    CVE-2012-1717
    CVE-2012-1717
    CVE-2012-1718
    CVE-2012-1718
    CVE-2012-1719
    CVE-2012-1719
    CVE-2012-1723
    CVE-2012-1723
    CVE-2012-1724
    CVE-2012-1724
    CVE-2012-1725
    CVE-2012-1725
    CVE-2012-1726
    CVE-2012-1726
    RHSA-2012:1009
    RHSA-2012:1009-01
    RHSA-2012:1009-01
    Platform(s):Red Hat Enterprise Linux 6
    Product(s):
    Definition Synopsis
  • Red Hat Enterprise Linux must be installed
  • OR Package Information
  • Red Hat Enterprise Linux 6 is installed
  • AND
  • java-1.7.0-openjdk is earlier than 1:1.7.0.5-2.2.1.el6_3
  • AND java-1.7.0-openjdk is signed with Red Hat redhatrelease2 key
  • java-1.7.0-openjdk-demo is earlier than 1:1.7.0.5-2.2.1.el6_3
  • AND java-1.7.0-openjdk-demo is signed with Red Hat redhatrelease2 key
  • java-1.7.0-openjdk-devel is earlier than 1:1.7.0.5-2.2.1.el6_3
  • AND java-1.7.0-openjdk-devel is signed with Red Hat redhatrelease2 key
  • java-1.7.0-openjdk-javadoc is earlier than 1:1.7.0.5-2.2.1.el6_3
  • AND java-1.7.0-openjdk-javadoc is signed with Red Hat redhatrelease2 key
  • java-1.7.0-openjdk-src is earlier than 1:1.7.0.5-2.2.1.el6_3
  • AND java-1.7.0-openjdk-src is signed with Red Hat redhatrelease2 key
  • BACK