Skip to navigation

Security Advisory Critical: java-1.6.0-sun security update

Advisory: RHSA-2009:0392-1
Type: Security Advisory
Severity: Critical
Issued on: 2009-03-26
Last updated on: 2009-03-26
Affected Products: RHEL Desktop Supplementary (v. 5 client)
RHEL Supplementary (v. 5 server)
RHEL Supplementary EUS (v. 5.3.z server)
RHEL Supplementary Long Life (v. 5.3 server)
Red Hat Enterprise Linux Extras (v. 4)
Red Hat Enterprise Linux Extras (v. 4.7.z)
CVEs (cve.mitre.org): CVE-2006-2426
CVE-2009-1093
CVE-2009-1094
CVE-2009-1095
CVE-2009-1096
CVE-2009-1097
CVE-2009-1098
CVE-2009-1099
CVE-2009-1100
CVE-2009-1101
CVE-2009-1102
CVE-2009-1103
CVE-2009-1104
CVE-2009-1105
CVE-2009-1106
CVE-2009-1107

Details

Updated java-1.6.0-sun packages that correct several security issues are
now available for Red Hat Enterprise Linux 4 Extras and 5 Supplementary.

This update has been rated as having critical security impact by the Red
Hat Security Response Team.

The Sun 1.6.0 Java release includes the Sun Java 6 Runtime Environment and
the Sun Java 6 Software Development Kit.

This update fixes several vulnerabilities in the Sun Java 6 Runtime
Environment and the Sun Java 6 Software Development Kit. These
vulnerabilities are summarized on the "Advance notification of Security
Updates for Java SE" page from Sun Microsystems, listed in the References
section. (CVE-2006-2426, CVE-2009-1093, CVE-2009-1094, CVE-2009-1095,
CVE-2009-1096, CVE-2009-1097, CVE-2009-1098, CVE-2009-1099, CVE-2009-1100,
CVE-2009-1101, CVE-2009-1102, CVE-2009-1103, CVE-2009-1104, CVE-2009-1105,
CVE-2009-1106, CVE-2009-1107)

Users of java-1.6.0-sun should upgrade to these updated packages, which
correct these issues. All running instances of Sun Java must be restarted
for the update to take effect.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

RHEL Desktop Supplementary (v. 5 client)

IA-32:
java-1.6.0-sun-1.6.0.13-1jpp.1.el5.i586.rpm     MD5: ae57461198b5ef4f93d1564f91023608
java-1.6.0-sun-demo-1.6.0.13-1jpp.1.el5.i586.rpm     MD5: 2e5f80501ab6b4ac665cdc91f2ff5af9
java-1.6.0-sun-devel-1.6.0.13-1jpp.1.el5.i586.rpm     MD5: f4f2195727ba222ab8b020c96af7fcc6
java-1.6.0-sun-jdbc-1.6.0.13-1jpp.1.el5.i586.rpm     MD5: 2cf6ac7169adb5b4a767313d90f6e259
java-1.6.0-sun-plugin-1.6.0.13-1jpp.1.el5.i586.rpm     MD5: da09922c71d02ef526ddcbc268983879
java-1.6.0-sun-src-1.6.0.13-1jpp.1.el5.i586.rpm     MD5: d5c43fbcdbce3e4fd7a81c6e9f66126c
 
x86_64:
java-1.6.0-sun-1.6.0.13-1jpp.1.el5.x86_64.rpm     MD5: 735390fb06dc93148c85dba842947f7e
java-1.6.0-sun-demo-1.6.0.13-1jpp.1.el5.x86_64.rpm     MD5: 16757e39c234a853337431b1ad5c70f1
java-1.6.0-sun-devel-1.6.0.13-1jpp.1.el5.x86_64.rpm     MD5: 1ba5d073942b351f011cd7e632da3326
java-1.6.0-sun-jdbc-1.6.0.13-1jpp.1.el5.x86_64.rpm     MD5: 7fcb6c00cbde693499cf008b1ecb079c
java-1.6.0-sun-plugin-1.6.0.13-1jpp.1.el5.i586.rpm     MD5: da09922c71d02ef526ddcbc268983879
java-1.6.0-sun-plugin-1.6.0.13-1jpp.1.el5.x86_64.rpm     MD5: 704d6be1baf67a7211ba17dedd849180
java-1.6.0-sun-src-1.6.0.13-1jpp.1.el5.x86_64.rpm     MD5: 56d9f034fb9800aca236983844312a4d
 
RHEL Supplementary (v. 5 server)

IA-32:
java-1.6.0-sun-1.6.0.13-1jpp.1.el5.i586.rpm     MD5: ae57461198b5ef4f93d1564f91023608
java-1.6.0-sun-demo-1.6.0.13-1jpp.1.el5.i586.rpm     MD5: 2e5f80501ab6b4ac665cdc91f2ff5af9
java-1.6.0-sun-devel-1.6.0.13-1jpp.1.el5.i586.rpm     MD5: f4f2195727ba222ab8b020c96af7fcc6
java-1.6.0-sun-jdbc-1.6.0.13-1jpp.1.el5.i586.rpm     MD5: 2cf6ac7169adb5b4a767313d90f6e259
java-1.6.0-sun-plugin-1.6.0.13-1jpp.1.el5.i586.rpm     MD5: da09922c71d02ef526ddcbc268983879
java-1.6.0-sun-src-1.6.0.13-1jpp.1.el5.i586.rpm     MD5: d5c43fbcdbce3e4fd7a81c6e9f66126c
 
x86_64:
java-1.6.0-sun-1.6.0.13-1jpp.1.el5.x86_64.rpm     MD5: 735390fb06dc93148c85dba842947f7e
java-1.6.0-sun-demo-1.6.0.13-1jpp.1.el5.x86_64.rpm     MD5: 16757e39c234a853337431b1ad5c70f1
java-1.6.0-sun-devel-1.6.0.13-1jpp.1.el5.x86_64.rpm     MD5: 1ba5d073942b351f011cd7e632da3326
java-1.6.0-sun-jdbc-1.6.0.13-1jpp.1.el5.x86_64.rpm     MD5: 7fcb6c00cbde693499cf008b1ecb079c
java-1.6.0-sun-plugin-1.6.0.13-1jpp.1.el5.i586.rpm     MD5: da09922c71d02ef526ddcbc268983879
java-1.6.0-sun-plugin-1.6.0.13-1jpp.1.el5.x86_64.rpm     MD5: 704d6be1baf67a7211ba17dedd849180
java-1.6.0-sun-src-1.6.0.13-1jpp.1.el5.x86_64.rpm     MD5: 56d9f034fb9800aca236983844312a4d
 
RHEL Supplementary EUS (v. 5.3.z server)

IA-32:
java-1.6.0-sun-1.6.0.13-1jpp.1.el5.i586.rpm
File outdated by:  RHSA-2009:1200
    MD5: ae57461198b5ef4f93d1564f91023608
java-1.6.0-sun-demo-1.6.0.13-1jpp.1.el5.i586.rpm
File outdated by:  RHSA-2009:1200
    MD5: 2e5f80501ab6b4ac665cdc91f2ff5af9
java-1.6.0-sun-devel-1.6.0.13-1jpp.1.el5.i586.rpm
File outdated by:  RHSA-2009:1200
    MD5: f4f2195727ba222ab8b020c96af7fcc6
java-1.6.0-sun-jdbc-1.6.0.13-1jpp.1.el5.i586.rpm
File outdated by:  RHSA-2009:1200
    MD5: 2cf6ac7169adb5b4a767313d90f6e259
java-1.6.0-sun-plugin-1.6.0.13-1jpp.1.el5.i586.rpm
File outdated by:  RHSA-2009:1200
    MD5: da09922c71d02ef526ddcbc268983879
java-1.6.0-sun-src-1.6.0.13-1jpp.1.el5.i586.rpm
File outdated by:  RHSA-2009:1200
    MD5: d5c43fbcdbce3e4fd7a81c6e9f66126c
 
x86_64:
java-1.6.0-sun-1.6.0.13-1jpp.1.el5.x86_64.rpm
File outdated by:  RHSA-2009:1200
    MD5: 735390fb06dc93148c85dba842947f7e
java-1.6.0-sun-demo-1.6.0.13-1jpp.1.el5.x86_64.rpm
File outdated by:  RHSA-2009:1200
    MD5: 16757e39c234a853337431b1ad5c70f1
java-1.6.0-sun-devel-1.6.0.13-1jpp.1.el5.x86_64.rpm
File outdated by:  RHSA-2009:1200
    MD5: 1ba5d073942b351f011cd7e632da3326
java-1.6.0-sun-jdbc-1.6.0.13-1jpp.1.el5.x86_64.rpm
File outdated by:  RHSA-2009:1200
    MD5: 7fcb6c00cbde693499cf008b1ecb079c
java-1.6.0-sun-plugin-1.6.0.13-1jpp.1.el5.i586.rpm
File outdated by:  RHSA-2009:1200
    MD5: da09922c71d02ef526ddcbc268983879
java-1.6.0-sun-plugin-1.6.0.13-1jpp.1.el5.x86_64.rpm
File outdated by:  RHSA-2009:1200
    MD5: 704d6be1baf67a7211ba17dedd849180
java-1.6.0-sun-src-1.6.0.13-1jpp.1.el5.x86_64.rpm
File outdated by:  RHSA-2009:1200
    MD5: 56d9f034fb9800aca236983844312a4d
 
RHEL Supplementary Long Life (v. 5.3 server)

IA-32:
java-1.6.0-sun-1.6.0.13-1jpp.1.el5.i586.rpm
File outdated by:  RHSA-2009:1200
    MD5: ae57461198b5ef4f93d1564f91023608
java-1.6.0-sun-demo-1.6.0.13-1jpp.1.el5.i586.rpm
File outdated by:  RHSA-2009:1200
    MD5: 2e5f80501ab6b4ac665cdc91f2ff5af9
java-1.6.0-sun-devel-1.6.0.13-1jpp.1.el5.i586.rpm
File outdated by:  RHSA-2009:1200
    MD5: f4f2195727ba222ab8b020c96af7fcc6
java-1.6.0-sun-jdbc-1.6.0.13-1jpp.1.el5.i586.rpm
File outdated by:  RHSA-2009:1200
    MD5: 2cf6ac7169adb5b4a767313d90f6e259
java-1.6.0-sun-plugin-1.6.0.13-1jpp.1.el5.i586.rpm
File outdated by:  RHSA-2009:1200
    MD5: da09922c71d02ef526ddcbc268983879
java-1.6.0-sun-src-1.6.0.13-1jpp.1.el5.i586.rpm
File outdated by:  RHSA-2009:1200
    MD5: d5c43fbcdbce3e4fd7a81c6e9f66126c
 
x86_64:
java-1.6.0-sun-1.6.0.13-1jpp.1.el5.x86_64.rpm
File outdated by:  RHSA-2009:1200
    MD5: 735390fb06dc93148c85dba842947f7e
java-1.6.0-sun-demo-1.6.0.13-1jpp.1.el5.x86_64.rpm
File outdated by:  RHSA-2009:1200
    MD5: 16757e39c234a853337431b1ad5c70f1
java-1.6.0-sun-devel-1.6.0.13-1jpp.1.el5.x86_64.rpm
File outdated by:  RHSA-2009:1200
    MD5: 1ba5d073942b351f011cd7e632da3326
java-1.6.0-sun-jdbc-1.6.0.13-1jpp.1.el5.x86_64.rpm
File outdated by:  RHSA-2009:1200
    MD5: 7fcb6c00cbde693499cf008b1ecb079c
java-1.6.0-sun-plugin-1.6.0.13-1jpp.1.el5.i586.rpm
File outdated by:  RHSA-2009:1200
    MD5: da09922c71d02ef526ddcbc268983879
java-1.6.0-sun-plugin-1.6.0.13-1jpp.1.el5.x86_64.rpm
File outdated by:  RHSA-2009:1200
    MD5: 704d6be1baf67a7211ba17dedd849180
java-1.6.0-sun-src-1.6.0.13-1jpp.1.el5.x86_64.rpm
File outdated by:  RHSA-2009:1200
    MD5: 56d9f034fb9800aca236983844312a4d
 
Red Hat Enterprise Linux Extras (v. 4)

IA-32:
java-1.6.0-sun-1.6.0.13-1jpp.1.el4.i586.rpm
File outdated by:  RHSA-2012:0139
    MD5: 0a926fa0c9f5198192cff44066882454
java-1.6.0-sun-demo-1.6.0.13-1jpp.1.el4.i586.rpm
File outdated by:  RHSA-2012:0139
    MD5: 8eb24c7fc4c6df216bce51f7ca2cf99b
java-1.6.0-sun-devel-1.6.0.13-1jpp.1.el4.i586.rpm
File outdated by:  RHSA-2012:0139
    MD5: f8ca1795efa6c622445cbd3b128128c8
java-1.6.0-sun-jdbc-1.6.0.13-1jpp.1.el4.i586.rpm
File outdated by:  RHSA-2012:0139
    MD5: 0335d20efc67f210cd87025156331d31
java-1.6.0-sun-plugin-1.6.0.13-1jpp.1.el4.i586.rpm
File outdated by:  RHSA-2012:0139
    MD5: 864622a36161b403502c5cf44d931228
java-1.6.0-sun-src-1.6.0.13-1jpp.1.el4.i586.rpm
File outdated by:  RHSA-2012:0139
    MD5: b43b7623cbb3eb01f8a297a46c723217
 
x86_64:
java-1.6.0-sun-1.6.0.13-1jpp.1.el4.x86_64.rpm
File outdated by:  RHSA-2012:0139
    MD5: 22e33c5e6850863fd48bb04d0a3ced7d
java-1.6.0-sun-demo-1.6.0.13-1jpp.1.el4.x86_64.rpm
File outdated by:  RHSA-2012:0139
    MD5: 2ba9f7b029799c91585417a5ed89882a
java-1.6.0-sun-devel-1.6.0.13-1jpp.1.el4.x86_64.rpm
File outdated by:  RHSA-2012:0139
    MD5: ab9ad51ff81218493049fab3b2dd1fca
java-1.6.0-sun-jdbc-1.6.0.13-1jpp.1.el4.x86_64.rpm
File outdated by:  RHSA-2012:0139
    MD5: 2b283be2c7dd489ebb2c3001638fc57d
java-1.6.0-sun-plugin-1.6.0.13-1jpp.1.el4.x86_64.rpm
File outdated by:  RHSA-2012:0139
    MD5: 8d76ee0f50a2c3df9877a1909eacfd77
java-1.6.0-sun-src-1.6.0.13-1jpp.1.el4.x86_64.rpm
File outdated by:  RHSA-2012:0139
    MD5: 350c3d425f1256f4777758778870b6bc
 
Red Hat Enterprise Linux Extras (v. 4.7.z)

IA-32:
java-1.6.0-sun-1.6.0.13-1jpp.1.el4.i586.rpm     MD5: 0a926fa0c9f5198192cff44066882454
java-1.6.0-sun-demo-1.6.0.13-1jpp.1.el4.i586.rpm     MD5: 8eb24c7fc4c6df216bce51f7ca2cf99b
java-1.6.0-sun-devel-1.6.0.13-1jpp.1.el4.i586.rpm     MD5: f8ca1795efa6c622445cbd3b128128c8
java-1.6.0-sun-jdbc-1.6.0.13-1jpp.1.el4.i586.rpm     MD5: 0335d20efc67f210cd87025156331d31
java-1.6.0-sun-plugin-1.6.0.13-1jpp.1.el4.i586.rpm     MD5: 864622a36161b403502c5cf44d931228
java-1.6.0-sun-src-1.6.0.13-1jpp.1.el4.i586.rpm     MD5: b43b7623cbb3eb01f8a297a46c723217
 
x86_64:
java-1.6.0-sun-1.6.0.13-1jpp.1.el4.x86_64.rpm     MD5: 22e33c5e6850863fd48bb04d0a3ced7d
java-1.6.0-sun-demo-1.6.0.13-1jpp.1.el4.x86_64.rpm     MD5: 2ba9f7b029799c91585417a5ed89882a
java-1.6.0-sun-devel-1.6.0.13-1jpp.1.el4.x86_64.rpm     MD5: ab9ad51ff81218493049fab3b2dd1fca
java-1.6.0-sun-jdbc-1.6.0.13-1jpp.1.el4.x86_64.rpm     MD5: 2b283be2c7dd489ebb2c3001638fc57d
java-1.6.0-sun-plugin-1.6.0.13-1jpp.1.el4.x86_64.rpm     MD5: 8d76ee0f50a2c3df9877a1909eacfd77
java-1.6.0-sun-src-1.6.0.13-1jpp.1.el4.x86_64.rpm     MD5: 350c3d425f1256f4777758778870b6bc
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

395481 - CVE-2006-2426 Untrusted applet causes DoS by filling up disk space
490166 - CVE-2009-1101 OpenJDK JAX-WS service endpoint remote Denial-of-Service (6630639)
490167 - CVE-2009-1093 OpenJDK remote LDAP Denial-Of-Service (6717680)
490168 - CVE-2009-1094 OpenJDK LDAP client remote code execution (6737315)
490169 - CVE-2009-1095 CVE-2009-1096 OpenJDK Pack200 Buffer overflow vulnerability (6792554)
490172 - CVE-2009-1102 OpenJDK code generation vulnerability (6636360)
490174 - CVE-2009-1097 OpenJDK PNG processing buffer overflow vulnerability (6804996)
490178 - CVE-2009-1098 OpenJDK GIF processing buffer overflow vulnerability (6804998)
492302 - CVE-2009-1099 OpenJDK: Type1 font processing buffer overflow vulnerability
492305 - CVE-2009-1100 OpenJDK: DoS (disk consumption) via handling of temporary font files
492306 - CVE-2009-1103 OpenJDK: Files disclosure, arbitrary code execution via "deserializing applets" (6646860)
492308 - CVE-2009-1104 OpenJDK: Intended access restrictions bypass via LiveConnect (6724331)
492309 - CVE-2009-1105 OpenJDK: Possibility of trusted applet run in older, vulnerable version of JRE (6706490)
492310 - CVE-2009-1106 OpenJDK: Improper parsing of crossdomain.xml files (intended access restriction bypass) (6798948)
492312 - CVE-2009-1107 OpenJDK: Signed applet remote misuse possibility (6782871)


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/