Skip to navigation

Security Advisory Important: java-1.7.0-openjdk security update

Advisory: RHSA-2013:0247-1
Type: Security Advisory
Severity: Important
Issued on: 2013-02-08
Last updated on: 2013-02-08
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)
Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux EUS (v. 5.9.z server)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Long Life (v. 5.9 server)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Server EUS (v. 6.3.z)
Red Hat Enterprise Linux Workstation (v. 6)
CVEs (cve.mitre.org): CVE-2013-0424
CVE-2013-0425
CVE-2013-0426
CVE-2013-0427
CVE-2013-0428
CVE-2013-0429
CVE-2013-0431
CVE-2013-0432
CVE-2013-0433
CVE-2013-0434
CVE-2013-0435
CVE-2013-0440
CVE-2013-0441
CVE-2013-0442
CVE-2013-0443
CVE-2013-0444
CVE-2013-0445
CVE-2013-0450
CVE-2013-1475
CVE-2013-1476
CVE-2013-1478
CVE-2013-1480

Details

Updated java-1.7.0-openjdk packages that fix several security issues are
now available for Red Hat Enterprise Linux 5 and 6.

The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

These packages provide the OpenJDK 7 Java Runtime Environment and the
OpenJDK 7 Software Development Kit.

Multiple improper permission check issues were discovered in the AWT,
CORBA, JMX, Libraries, and Beans components in OpenJDK. An untrusted Java
application or applet could use these flaws to bypass Java sandbox
restrictions. (CVE-2013-0442, CVE-2013-0445, CVE-2013-0441, CVE-2013-1475,
CVE-2013-1476, CVE-2013-0429, CVE-2013-0450, CVE-2013-0425, CVE-2013-0426,
CVE-2013-0428, CVE-2013-0444)

Multiple flaws were found in the way image parsers in the 2D and AWT
components handled image raster parameters. A specially-crafted image could
cause Java Virtual Machine memory corruption and, possibly, lead to
arbitrary code execution with the virtual machine privileges.
(CVE-2013-1478, CVE-2013-1480)

A flaw was found in the AWT component's clipboard handling code. An
untrusted Java application or applet could use this flaw to access
clipboard data, bypassing Java sandbox restrictions. (CVE-2013-0432)

The default Java security properties configuration did not restrict access
to certain com.sun.xml.internal packages. An untrusted Java application or
applet could use this flaw to access information, bypassing certain Java
sandbox restrictions. This update lists the whole package as restricted.
(CVE-2013-0435)

Multiple improper permission check issues were discovered in the JMX,
Libraries, Networking, and JAXP components. An untrusted Java application
or applet could use these flaws to bypass certain Java sandbox
restrictions. (CVE-2013-0431, CVE-2013-0427, CVE-2013-0433, CVE-2013-0434)

It was discovered that the RMI component's CGIHandler class used user
inputs in error messages without any sanitization. An attacker could use
this flaw to perform a cross-site scripting (XSS) attack. (CVE-2013-0424)

It was discovered that the SSL/TLS implementation in the JSSE component
did not properly enforce handshake message ordering, allowing an unlimited
number of handshake restarts. A remote attacker could use this flaw to
make an SSL/TLS server using JSSE consume an excessive amount of CPU by
continuously restarting the handshake. (CVE-2013-0440)

It was discovered that the JSSE component did not properly validate
Diffie-Hellman public keys. An SSL/TLS client could possibly use this flaw
to perform a small subgroup attack. (CVE-2013-0443)

This erratum also upgrades the OpenJDK package to IcedTea7 2.3.5. Refer to
the NEWS file, linked to in the References, for further information.

All users of java-1.7.0-openjdk are advised to upgrade to these updated
packages, which resolve these issues. All running instances of OpenJDK Java
must be restarted for the update to take effect.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
java-1.7.0-openjdk-1.7.0.9-2.3.5.3.el5_9.src.rpm
File outdated by:  RHBA-2013:1005
    MD5: 67350137278498216ca3c58e199ada46
SHA-256: d2fbc3fa906480345b3d8bf402ba86485feb3f7e4bd88720de8391de55d1730d
 
IA-32:
java-1.7.0-openjdk-1.7.0.9-2.3.5.3.el5_9.i386.rpm
File outdated by:  RHSA-2014:0407
    MD5: 816a746452104df727c985d42bfcfef9
SHA-256: 34febee57d7416eb7984fc1eff3f77af863f5d5a59b672081f1b00e4cba910df
java-1.7.0-openjdk-debuginfo-1.7.0.9-2.3.5.3.el5_9.i386.rpm
File outdated by:  RHSA-2014:0407
    MD5: f46ad38b8725262e405f0914b7b6092f
SHA-256: cb1706a47377f3d40112726443ef9fb58650a29c6dc4871f6f5659caecd93c65
java-1.7.0-openjdk-demo-1.7.0.9-2.3.5.3.el5_9.i386.rpm
File outdated by:  RHSA-2014:0407
    MD5: 951ae5c7ce31d7e278534170aefea983
SHA-256: fead7b66fa63c6fe25b5f45278626c5bf1d956758b591cc2f96ca94d17b74b25
java-1.7.0-openjdk-devel-1.7.0.9-2.3.5.3.el5_9.i386.rpm
File outdated by:  RHSA-2014:0407
    MD5: 876496c164883c7a353dbda040263218
SHA-256: 1af5be4e9f2e8b8c7a668121ec458040a16e4a127964f3a60d5a332693b9c816
java-1.7.0-openjdk-javadoc-1.7.0.9-2.3.5.3.el5_9.i386.rpm
File outdated by:  RHSA-2014:0407
    MD5: a50bbf57cd47bb9db6c48e7bd5936373
SHA-256: 15814b2c1c55a4324e80a4cd78fa8c2d96fbba6e35e5919346fec7624e949466
java-1.7.0-openjdk-src-1.7.0.9-2.3.5.3.el5_9.i386.rpm
File outdated by:  RHSA-2014:0407
    MD5: 3cd7ee5f9c2125c11d7b57953c16d694
SHA-256: 0ac94480acaa4d5ef5b4a4b076404c4ef44d48f8a62f02c0da1e24488b75c3a3
 
x86_64:
java-1.7.0-openjdk-1.7.0.9-2.3.5.3.el5_9.x86_64.rpm
File outdated by:  RHSA-2014:0407
    MD5: b36dfe58b129ab492fbf66c36de46cef
SHA-256: 4442fa9406316761af3979a6f737fc4dc53aa00c1c20216af91148296e578b42
java-1.7.0-openjdk-debuginfo-1.7.0.9-2.3.5.3.el5_9.x86_64.rpm
File outdated by:  RHSA-2014:0407
    MD5: 18a7b3651e26851a176f8aeef7267f77
SHA-256: c4716909bc0f2421259bbadad83b7d184771f40d556a69ab054fecf6b88bdfac
java-1.7.0-openjdk-demo-1.7.0.9-2.3.5.3.el5_9.x86_64.rpm
File outdated by:  RHSA-2014:0407
    MD5: ee52d27f5aa4ea91175d01fd29c502d8
SHA-256: 4de1bd2d75d08dc4f8c01b9d5ba77ae49451261aa130449d027618ca2ab6728d
java-1.7.0-openjdk-devel-1.7.0.9-2.3.5.3.el5_9.x86_64.rpm
File outdated by:  RHSA-2014:0407
    MD5: ae7c53df82c5431f93e03c5a061a5db7
SHA-256: c4f9c7ad434ecb141f2a07f4dc9b5b68aba29d21c096bdac232f01b28e36857b
java-1.7.0-openjdk-javadoc-1.7.0.9-2.3.5.3.el5_9.x86_64.rpm
File outdated by:  RHSA-2014:0407
    MD5: 3be25d987d4ad40604659cebfc0153fd
SHA-256: 276952bc9374583a1ce9244b018039ef3e5a3ce1dc3e902387154fba1ad70861
java-1.7.0-openjdk-src-1.7.0.9-2.3.5.3.el5_9.x86_64.rpm
File outdated by:  RHSA-2014:0407
    MD5: 0fb77b03d6787099d7a3ab54eb196ccf
SHA-256: 7b34532905b1bc04eb122745f178b64689fbc5cb9974e09bda5c6211a43eb3be
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
java-1.7.0-openjdk-1.7.0.9-2.3.5.3.el5_9.src.rpm
File outdated by:  RHBA-2013:1005
    MD5: 67350137278498216ca3c58e199ada46
SHA-256: d2fbc3fa906480345b3d8bf402ba86485feb3f7e4bd88720de8391de55d1730d
 
IA-32:
java-1.7.0-openjdk-1.7.0.9-2.3.5.3.el5_9.i386.rpm
File outdated by:  RHSA-2014:0407
    MD5: 816a746452104df727c985d42bfcfef9
SHA-256: 34febee57d7416eb7984fc1eff3f77af863f5d5a59b672081f1b00e4cba910df
java-1.7.0-openjdk-debuginfo-1.7.0.9-2.3.5.3.el5_9.i386.rpm
File outdated by:  RHSA-2014:0407
    MD5: f46ad38b8725262e405f0914b7b6092f
SHA-256: cb1706a47377f3d40112726443ef9fb58650a29c6dc4871f6f5659caecd93c65
java-1.7.0-openjdk-demo-1.7.0.9-2.3.5.3.el5_9.i386.rpm
File outdated by:  RHSA-2014:0407
    MD5: 951ae5c7ce31d7e278534170aefea983
SHA-256: fead7b66fa63c6fe25b5f45278626c5bf1d956758b591cc2f96ca94d17b74b25
java-1.7.0-openjdk-devel-1.7.0.9-2.3.5.3.el5_9.i386.rpm
File outdated by:  RHSA-2014:0407
    MD5: 876496c164883c7a353dbda040263218
SHA-256: 1af5be4e9f2e8b8c7a668121ec458040a16e4a127964f3a60d5a332693b9c816
java-1.7.0-openjdk-javadoc-1.7.0.9-2.3.5.3.el5_9.i386.rpm
File outdated by:  RHSA-2014:0407
    MD5: a50bbf57cd47bb9db6c48e7bd5936373
SHA-256: 15814b2c1c55a4324e80a4cd78fa8c2d96fbba6e35e5919346fec7624e949466
java-1.7.0-openjdk-src-1.7.0.9-2.3.5.3.el5_9.i386.rpm
File outdated by:  RHSA-2014:0407
    MD5: 3cd7ee5f9c2125c11d7b57953c16d694
SHA-256: 0ac94480acaa4d5ef5b4a4b076404c4ef44d48f8a62f02c0da1e24488b75c3a3
 
x86_64:
java-1.7.0-openjdk-1.7.0.9-2.3.5.3.el5_9.x86_64.rpm
File outdated by:  RHSA-2014:0407
    MD5: b36dfe58b129ab492fbf66c36de46cef
SHA-256: 4442fa9406316761af3979a6f737fc4dc53aa00c1c20216af91148296e578b42
java-1.7.0-openjdk-debuginfo-1.7.0.9-2.3.5.3.el5_9.x86_64.rpm
File outdated by:  RHSA-2014:0407
    MD5: 18a7b3651e26851a176f8aeef7267f77
SHA-256: c4716909bc0f2421259bbadad83b7d184771f40d556a69ab054fecf6b88bdfac
java-1.7.0-openjdk-demo-1.7.0.9-2.3.5.3.el5_9.x86_64.rpm
File outdated by:  RHSA-2014:0407
    MD5: ee52d27f5aa4ea91175d01fd29c502d8
SHA-256: 4de1bd2d75d08dc4f8c01b9d5ba77ae49451261aa130449d027618ca2ab6728d
java-1.7.0-openjdk-devel-1.7.0.9-2.3.5.3.el5_9.x86_64.rpm
File outdated by:  RHSA-2014:0407
    MD5: ae7c53df82c5431f93e03c5a061a5db7
SHA-256: c4f9c7ad434ecb141f2a07f4dc9b5b68aba29d21c096bdac232f01b28e36857b
java-1.7.0-openjdk-javadoc-1.7.0.9-2.3.5.3.el5_9.x86_64.rpm
File outdated by:  RHSA-2014:0407
    MD5: 3be25d987d4ad40604659cebfc0153fd
SHA-256: 276952bc9374583a1ce9244b018039ef3e5a3ce1dc3e902387154fba1ad70861
java-1.7.0-openjdk-src-1.7.0.9-2.3.5.3.el5_9.x86_64.rpm
File outdated by:  RHSA-2014:0407
    MD5: 0fb77b03d6787099d7a3ab54eb196ccf
SHA-256: 7b34532905b1bc04eb122745f178b64689fbc5cb9974e09bda5c6211a43eb3be
 
Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
java-1.7.0-openjdk-1.7.0.9-2.3.5.3.el6_3.src.rpm
File outdated by:  RHSA-2014:0406
    MD5: 9c2ea39df49d72751552409adfdd869a
SHA-256: 4dafc55dfbc10eb80d5b94acb68c282c45185830f81d847fb21f030c2a590660
 
IA-32:
java-1.7.0-openjdk-1.7.0.9-2.3.5.3.el6_3.i686.rpm
File outdated by:  RHSA-2014:0406
    MD5: 1ec3c4bbbd9131c049ba44780b8bf60b
SHA-256: 4cb436cb522efc488395ab52a94aa606e6daee589495aefc428e887f849ca5bb
java-1.7.0-openjdk-debuginfo-1.7.0.9-2.3.5.3.el6_3.i686.rpm
File outdated by:  RHSA-2014:0406
    MD5: 8bb5d14dd0173dc178d2ba57224fe9c0
SHA-256: 53d15bbba7d60ae10fccfa3e6fc16b34a9a49858f2013b7876efeb3298f52708
java-1.7.0-openjdk-demo-1.7.0.9-2.3.5.3.el6_3.i686.rpm
File outdated by:  RHSA-2014:0406
    MD5: d48232409b2527aae237ea10f6806d28
SHA-256: b7489b7bd92540734081ce71c5b9e9bbcea16c84b3ac3f0a7c275149b711a3f7
java-1.7.0-openjdk-devel-1.7.0.9-2.3.5.3.el6_3.i686.rpm
File outdated by:  RHSA-2014:0406
    MD5: 554e46c3609d9e7ad1e6227b628e4dc2
SHA-256: 1880b7fb2002c835561a360f4694155e4b5071f79e5931329cc3d46dd53480d0
java-1.7.0-openjdk-javadoc-1.7.0.9-2.3.5.3.el6_3.noarch.rpm
File outdated by:  RHSA-2014:0406
    MD5: 4f881dfab88dde99adf3d144181ce3dd
SHA-256: d07ae6504cff39f0e7759951c412b46bd610585e0021d567e26c3e0a962f09b5
java-1.7.0-openjdk-src-1.7.0.9-2.3.5.3.el6_3.i686.rpm
File outdated by:  RHSA-2014:0406
    MD5: 671e83360bfc161f0b5d3f49df3bff87
SHA-256: f81affa2b147e8c6a724692c14d88d5702bad46ca03636e1946d99641547efe6
 
x86_64:
java-1.7.0-openjdk-1.7.0.9-2.3.5.3.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0406
    MD5: 073646640bc2eed8dbb854af2bd7182b
SHA-256: 4f01709f2131f8e556fd7858ece1c603d8eca0954f5ddf09faa174c892ca90c9
java-1.7.0-openjdk-debuginfo-1.7.0.9-2.3.5.3.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0406
    MD5: 808bbf14cc1ed556c630ec847a5d0b18
SHA-256: 9bf07ab644a372f7c3589cd449bd345959626958942a211c54e498d550a8090a
java-1.7.0-openjdk-demo-1.7.0.9-2.3.5.3.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0406
    MD5: 097d2a199e71c43d4363737f53a5709a
SHA-256: 86bac5a5c2fee2e9f382eb64d8150c824658c8b51be83e8f516477b52f812180
java-1.7.0-openjdk-devel-1.7.0.9-2.3.5.3.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0406
    MD5: a825dfa936f2114ed598cac9d7ed7f82
SHA-256: 39c1bad94b94551252c41820edc68d579dcc364cdc6c1f689422b457b5df562e
java-1.7.0-openjdk-javadoc-1.7.0.9-2.3.5.3.el6_3.noarch.rpm
File outdated by:  RHSA-2014:0406
    MD5: 4f881dfab88dde99adf3d144181ce3dd
SHA-256: d07ae6504cff39f0e7759951c412b46bd610585e0021d567e26c3e0a962f09b5
java-1.7.0-openjdk-src-1.7.0.9-2.3.5.3.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0406
    MD5: a6ed4dca01083705a968f5ba0c21eae9
SHA-256: 6ed3d2f2de8d88d6487299d5032f48249fe42b5ba775fd8ca617eab0dbb039f8
 
Red Hat Enterprise Linux EUS (v. 5.9.z server)

SRPMS:
java-1.7.0-openjdk-1.7.0.9-2.3.5.3.el5_9.src.rpm
File outdated by:  RHBA-2013:1005
    MD5: 67350137278498216ca3c58e199ada46
SHA-256: d2fbc3fa906480345b3d8bf402ba86485feb3f7e4bd88720de8391de55d1730d
 
IA-32:
java-1.7.0-openjdk-1.7.0.9-2.3.5.3.el5_9.i386.rpm
File outdated by:  RHBA-2013:1005
    MD5: 816a746452104df727c985d42bfcfef9
SHA-256: 34febee57d7416eb7984fc1eff3f77af863f5d5a59b672081f1b00e4cba910df
java-1.7.0-openjdk-debuginfo-1.7.0.9-2.3.5.3.el5_9.i386.rpm
File outdated by:  RHBA-2013:1005
    MD5: f46ad38b8725262e405f0914b7b6092f
SHA-256: cb1706a47377f3d40112726443ef9fb58650a29c6dc4871f6f5659caecd93c65
java-1.7.0-openjdk-demo-1.7.0.9-2.3.5.3.el5_9.i386.rpm
File outdated by:  RHBA-2013:1005
    MD5: 951ae5c7ce31d7e278534170aefea983
SHA-256: fead7b66fa63c6fe25b5f45278626c5bf1d956758b591cc2f96ca94d17b74b25
java-1.7.0-openjdk-devel-1.7.0.9-2.3.5.3.el5_9.i386.rpm
File outdated by:  RHBA-2013:1005
    MD5: 876496c164883c7a353dbda040263218
SHA-256: 1af5be4e9f2e8b8c7a668121ec458040a16e4a127964f3a60d5a332693b9c816
java-1.7.0-openjdk-javadoc-1.7.0.9-2.3.5.3.el5_9.i386.rpm
File outdated by:  RHBA-2013:1005
    MD5: a50bbf57cd47bb9db6c48e7bd5936373
SHA-256: 15814b2c1c55a4324e80a4cd78fa8c2d96fbba6e35e5919346fec7624e949466
java-1.7.0-openjdk-src-1.7.0.9-2.3.5.3.el5_9.i386.rpm
File outdated by:  RHBA-2013:1005
    MD5: 3cd7ee5f9c2125c11d7b57953c16d694
SHA-256: 0ac94480acaa4d5ef5b4a4b076404c4ef44d48f8a62f02c0da1e24488b75c3a3
 
x86_64:
java-1.7.0-openjdk-1.7.0.9-2.3.5.3.el5_9.x86_64.rpm
File outdated by:  RHBA-2013:1005
    MD5: b36dfe58b129ab492fbf66c36de46cef
SHA-256: 4442fa9406316761af3979a6f737fc4dc53aa00c1c20216af91148296e578b42
java-1.7.0-openjdk-debuginfo-1.7.0.9-2.3.5.3.el5_9.x86_64.rpm
File outdated by:  RHBA-2013:1005
    MD5: 18a7b3651e26851a176f8aeef7267f77
SHA-256: c4716909bc0f2421259bbadad83b7d184771f40d556a69ab054fecf6b88bdfac
java-1.7.0-openjdk-demo-1.7.0.9-2.3.5.3.el5_9.x86_64.rpm
File outdated by:  RHBA-2013:1005
    MD5: ee52d27f5aa4ea91175d01fd29c502d8
SHA-256: 4de1bd2d75d08dc4f8c01b9d5ba77ae49451261aa130449d027618ca2ab6728d
java-1.7.0-openjdk-devel-1.7.0.9-2.3.5.3.el5_9.x86_64.rpm
File outdated by:  RHBA-2013:1005
    MD5: ae7c53df82c5431f93e03c5a061a5db7
SHA-256: c4f9c7ad434ecb141f2a07f4dc9b5b68aba29d21c096bdac232f01b28e36857b
java-1.7.0-openjdk-javadoc-1.7.0.9-2.3.5.3.el5_9.x86_64.rpm
File outdated by:  RHBA-2013:1005
    MD5: 3be25d987d4ad40604659cebfc0153fd
SHA-256: 276952bc9374583a1ce9244b018039ef3e5a3ce1dc3e902387154fba1ad70861
java-1.7.0-openjdk-src-1.7.0.9-2.3.5.3.el5_9.x86_64.rpm
File outdated by:  RHBA-2013:1005
    MD5: 0fb77b03d6787099d7a3ab54eb196ccf
SHA-256: 7b34532905b1bc04eb122745f178b64689fbc5cb9974e09bda5c6211a43eb3be
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
java-1.7.0-openjdk-1.7.0.9-2.3.5.3.el6_3.src.rpm
File outdated by:  RHSA-2014:0406
    MD5: 9c2ea39df49d72751552409adfdd869a
SHA-256: 4dafc55dfbc10eb80d5b94acb68c282c45185830f81d847fb21f030c2a590660
 
x86_64:
java-1.7.0-openjdk-1.7.0.9-2.3.5.3.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0406
    MD5: 073646640bc2eed8dbb854af2bd7182b
SHA-256: 4f01709f2131f8e556fd7858ece1c603d8eca0954f5ddf09faa174c892ca90c9
java-1.7.0-openjdk-debuginfo-1.7.0.9-2.3.5.3.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0406
    MD5: 808bbf14cc1ed556c630ec847a5d0b18
SHA-256: 9bf07ab644a372f7c3589cd449bd345959626958942a211c54e498d550a8090a
java-1.7.0-openjdk-demo-1.7.0.9-2.3.5.3.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0406
    MD5: 097d2a199e71c43d4363737f53a5709a
SHA-256: 86bac5a5c2fee2e9f382eb64d8150c824658c8b51be83e8f516477b52f812180
java-1.7.0-openjdk-devel-1.7.0.9-2.3.5.3.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0406
    MD5: a825dfa936f2114ed598cac9d7ed7f82
SHA-256: 39c1bad94b94551252c41820edc68d579dcc364cdc6c1f689422b457b5df562e
java-1.7.0-openjdk-javadoc-1.7.0.9-2.3.5.3.el6_3.noarch.rpm
File outdated by:  RHSA-2014:0406
    MD5: 4f881dfab88dde99adf3d144181ce3dd
SHA-256: d07ae6504cff39f0e7759951c412b46bd610585e0021d567e26c3e0a962f09b5
java-1.7.0-openjdk-src-1.7.0.9-2.3.5.3.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0406
    MD5: a6ed4dca01083705a968f5ba0c21eae9
SHA-256: 6ed3d2f2de8d88d6487299d5032f48249fe42b5ba775fd8ca617eab0dbb039f8
 
Red Hat Enterprise Linux Long Life (v. 5.9 server)

SRPMS:
java-1.7.0-openjdk-1.7.0.9-2.3.5.3.el5_9.src.rpm
File outdated by:  RHBA-2013:1005
    MD5: 67350137278498216ca3c58e199ada46
SHA-256: d2fbc3fa906480345b3d8bf402ba86485feb3f7e4bd88720de8391de55d1730d
 
IA-32:
java-1.7.0-openjdk-1.7.0.9-2.3.5.3.el5_9.i386.rpm
File outdated by:  RHBA-2013:1005
    MD5: 816a746452104df727c985d42bfcfef9
SHA-256: 34febee57d7416eb7984fc1eff3f77af863f5d5a59b672081f1b00e4cba910df
java-1.7.0-openjdk-debuginfo-1.7.0.9-2.3.5.3.el5_9.i386.rpm
File outdated by:  RHBA-2013:1005
    MD5: f46ad38b8725262e405f0914b7b6092f
SHA-256: cb1706a47377f3d40112726443ef9fb58650a29c6dc4871f6f5659caecd93c65
java-1.7.0-openjdk-demo-1.7.0.9-2.3.5.3.el5_9.i386.rpm
File outdated by:  RHBA-2013:1005
    MD5: 951ae5c7ce31d7e278534170aefea983
SHA-256: fead7b66fa63c6fe25b5f45278626c5bf1d956758b591cc2f96ca94d17b74b25
java-1.7.0-openjdk-devel-1.7.0.9-2.3.5.3.el5_9.i386.rpm
File outdated by:  RHBA-2013:1005
    MD5: 876496c164883c7a353dbda040263218
SHA-256: 1af5be4e9f2e8b8c7a668121ec458040a16e4a127964f3a60d5a332693b9c816
java-1.7.0-openjdk-javadoc-1.7.0.9-2.3.5.3.el5_9.i386.rpm
File outdated by:  RHBA-2013:1005
    MD5: a50bbf57cd47bb9db6c48e7bd5936373
SHA-256: 15814b2c1c55a4324e80a4cd78fa8c2d96fbba6e35e5919346fec7624e949466
java-1.7.0-openjdk-src-1.7.0.9-2.3.5.3.el5_9.i386.rpm
File outdated by:  RHBA-2013:1005
    MD5: 3cd7ee5f9c2125c11d7b57953c16d694
SHA-256: 0ac94480acaa4d5ef5b4a4b076404c4ef44d48f8a62f02c0da1e24488b75c3a3
 
x86_64:
java-1.7.0-openjdk-1.7.0.9-2.3.5.3.el5_9.x86_64.rpm
File outdated by:  RHBA-2013:1005
    MD5: b36dfe58b129ab492fbf66c36de46cef
SHA-256: 4442fa9406316761af3979a6f737fc4dc53aa00c1c20216af91148296e578b42
java-1.7.0-openjdk-debuginfo-1.7.0.9-2.3.5.3.el5_9.x86_64.rpm
File outdated by:  RHBA-2013:1005
    MD5: 18a7b3651e26851a176f8aeef7267f77
SHA-256: c4716909bc0f2421259bbadad83b7d184771f40d556a69ab054fecf6b88bdfac
java-1.7.0-openjdk-demo-1.7.0.9-2.3.5.3.el5_9.x86_64.rpm
File outdated by:  RHBA-2013:1005
    MD5: ee52d27f5aa4ea91175d01fd29c502d8
SHA-256: 4de1bd2d75d08dc4f8c01b9d5ba77ae49451261aa130449d027618ca2ab6728d
java-1.7.0-openjdk-devel-1.7.0.9-2.3.5.3.el5_9.x86_64.rpm
File outdated by:  RHBA-2013:1005
    MD5: ae7c53df82c5431f93e03c5a061a5db7
SHA-256: c4f9c7ad434ecb141f2a07f4dc9b5b68aba29d21c096bdac232f01b28e36857b
java-1.7.0-openjdk-javadoc-1.7.0.9-2.3.5.3.el5_9.x86_64.rpm
File outdated by:  RHBA-2013:1005
    MD5: 3be25d987d4ad40604659cebfc0153fd
SHA-256: 276952bc9374583a1ce9244b018039ef3e5a3ce1dc3e902387154fba1ad70861
java-1.7.0-openjdk-src-1.7.0.9-2.3.5.3.el5_9.x86_64.rpm
File outdated by:  RHBA-2013:1005
    MD5: 0fb77b03d6787099d7a3ab54eb196ccf
SHA-256: 7b34532905b1bc04eb122745f178b64689fbc5cb9974e09bda5c6211a43eb3be
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
java-1.7.0-openjdk-1.7.0.9-2.3.5.3.el6_3.src.rpm
File outdated by:  RHSA-2014:0406
    MD5: 9c2ea39df49d72751552409adfdd869a
SHA-256: 4dafc55dfbc10eb80d5b94acb68c282c45185830f81d847fb21f030c2a590660
 
IA-32:
java-1.7.0-openjdk-1.7.0.9-2.3.5.3.el6_3.i686.rpm
File outdated by:  RHSA-2014:0406
    MD5: 1ec3c4bbbd9131c049ba44780b8bf60b
SHA-256: 4cb436cb522efc488395ab52a94aa606e6daee589495aefc428e887f849ca5bb
java-1.7.0-openjdk-debuginfo-1.7.0.9-2.3.5.3.el6_3.i686.rpm
File outdated by:  RHSA-2014:0406
    MD5: 8bb5d14dd0173dc178d2ba57224fe9c0
SHA-256: 53d15bbba7d60ae10fccfa3e6fc16b34a9a49858f2013b7876efeb3298f52708
java-1.7.0-openjdk-demo-1.7.0.9-2.3.5.3.el6_3.i686.rpm
File outdated by:  RHSA-2014:0406
    MD5: d48232409b2527aae237ea10f6806d28
SHA-256: b7489b7bd92540734081ce71c5b9e9bbcea16c84b3ac3f0a7c275149b711a3f7
java-1.7.0-openjdk-devel-1.7.0.9-2.3.5.3.el6_3.i686.rpm
File outdated by:  RHSA-2014:0406
    MD5: 554e46c3609d9e7ad1e6227b628e4dc2
SHA-256: 1880b7fb2002c835561a360f4694155e4b5071f79e5931329cc3d46dd53480d0
java-1.7.0-openjdk-javadoc-1.7.0.9-2.3.5.3.el6_3.noarch.rpm
File outdated by:  RHSA-2013:1451
    MD5: 4f881dfab88dde99adf3d144181ce3dd
SHA-256: d07ae6504cff39f0e7759951c412b46bd610585e0021d567e26c3e0a962f09b5
java-1.7.0-openjdk-src-1.7.0.9-2.3.5.3.el6_3.i686.rpm
File outdated by:  RHSA-2014:0406
    MD5: 671e83360bfc161f0b5d3f49df3bff87
SHA-256: f81affa2b147e8c6a724692c14d88d5702bad46ca03636e1946d99641547efe6
 
x86_64:
java-1.7.0-openjdk-1.7.0.9-2.3.5.3.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0406
    MD5: 073646640bc2eed8dbb854af2bd7182b
SHA-256: 4f01709f2131f8e556fd7858ece1c603d8eca0954f5ddf09faa174c892ca90c9
java-1.7.0-openjdk-debuginfo-1.7.0.9-2.3.5.3.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0406
    MD5: 808bbf14cc1ed556c630ec847a5d0b18
SHA-256: 9bf07ab644a372f7c3589cd449bd345959626958942a211c54e498d550a8090a
java-1.7.0-openjdk-demo-1.7.0.9-2.3.5.3.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0406
    MD5: 097d2a199e71c43d4363737f53a5709a
SHA-256: 86bac5a5c2fee2e9f382eb64d8150c824658c8b51be83e8f516477b52f812180
java-1.7.0-openjdk-devel-1.7.0.9-2.3.5.3.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0406
    MD5: a825dfa936f2114ed598cac9d7ed7f82
SHA-256: 39c1bad94b94551252c41820edc68d579dcc364cdc6c1f689422b457b5df562e
java-1.7.0-openjdk-javadoc-1.7.0.9-2.3.5.3.el6_3.noarch.rpm
File outdated by:  RHSA-2013:1451
    MD5: 4f881dfab88dde99adf3d144181ce3dd
SHA-256: d07ae6504cff39f0e7759951c412b46bd610585e0021d567e26c3e0a962f09b5
java-1.7.0-openjdk-src-1.7.0.9-2.3.5.3.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0406
    MD5: a6ed4dca01083705a968f5ba0c21eae9
SHA-256: 6ed3d2f2de8d88d6487299d5032f48249fe42b5ba775fd8ca617eab0dbb039f8
 
Red Hat Enterprise Linux Server EUS (v. 6.3.z)

SRPMS:
java-1.7.0-openjdk-1.7.0.9-2.3.5.3.el6_3.src.rpm
File outdated by:  RHSA-2014:0406
    MD5: 9c2ea39df49d72751552409adfdd869a
SHA-256: 4dafc55dfbc10eb80d5b94acb68c282c45185830f81d847fb21f030c2a590660
 
IA-32:
java-1.7.0-openjdk-1.7.0.9-2.3.5.3.el6_3.i686.rpm
File outdated by:  RHSA-2013:0275
    MD5: 1ec3c4bbbd9131c049ba44780b8bf60b
SHA-256: 4cb436cb522efc488395ab52a94aa606e6daee589495aefc428e887f849ca5bb
java-1.7.0-openjdk-debuginfo-1.7.0.9-2.3.5.3.el6_3.i686.rpm
File outdated by:  RHSA-2013:0275
    MD5: 8bb5d14dd0173dc178d2ba57224fe9c0
SHA-256: 53d15bbba7d60ae10fccfa3e6fc16b34a9a49858f2013b7876efeb3298f52708
java-1.7.0-openjdk-demo-1.7.0.9-2.3.5.3.el6_3.i686.rpm
File outdated by:  RHSA-2013:0275
    MD5: d48232409b2527aae237ea10f6806d28
SHA-256: b7489b7bd92540734081ce71c5b9e9bbcea16c84b3ac3f0a7c275149b711a3f7
java-1.7.0-openjdk-devel-1.7.0.9-2.3.5.3.el6_3.i686.rpm
File outdated by:  RHSA-2013:0275
    MD5: 554e46c3609d9e7ad1e6227b628e4dc2
SHA-256: 1880b7fb2002c835561a360f4694155e4b5071f79e5931329cc3d46dd53480d0
java-1.7.0-openjdk-javadoc-1.7.0.9-2.3.5.3.el6_3.noarch.rpm
File outdated by:  RHSA-2013:0275
    MD5: 4f881dfab88dde99adf3d144181ce3dd
SHA-256: d07ae6504cff39f0e7759951c412b46bd610585e0021d567e26c3e0a962f09b5
java-1.7.0-openjdk-src-1.7.0.9-2.3.5.3.el6_3.i686.rpm
File outdated by:  RHSA-2013:0275
    MD5: 671e83360bfc161f0b5d3f49df3bff87
SHA-256: f81affa2b147e8c6a724692c14d88d5702bad46ca03636e1946d99641547efe6
 
x86_64:
java-1.7.0-openjdk-1.7.0.9-2.3.5.3.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:0275
    MD5: 073646640bc2eed8dbb854af2bd7182b
SHA-256: 4f01709f2131f8e556fd7858ece1c603d8eca0954f5ddf09faa174c892ca90c9
java-1.7.0-openjdk-debuginfo-1.7.0.9-2.3.5.3.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:0275
    MD5: 808bbf14cc1ed556c630ec847a5d0b18
SHA-256: 9bf07ab644a372f7c3589cd449bd345959626958942a211c54e498d550a8090a
java-1.7.0-openjdk-demo-1.7.0.9-2.3.5.3.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:0275
    MD5: 097d2a199e71c43d4363737f53a5709a
SHA-256: 86bac5a5c2fee2e9f382eb64d8150c824658c8b51be83e8f516477b52f812180
java-1.7.0-openjdk-devel-1.7.0.9-2.3.5.3.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:0275
    MD5: a825dfa936f2114ed598cac9d7ed7f82
SHA-256: 39c1bad94b94551252c41820edc68d579dcc364cdc6c1f689422b457b5df562e
java-1.7.0-openjdk-javadoc-1.7.0.9-2.3.5.3.el6_3.noarch.rpm
File outdated by:  RHSA-2013:0275
    MD5: 4f881dfab88dde99adf3d144181ce3dd
SHA-256: d07ae6504cff39f0e7759951c412b46bd610585e0021d567e26c3e0a962f09b5
java-1.7.0-openjdk-src-1.7.0.9-2.3.5.3.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:0275
    MD5: a6ed4dca01083705a968f5ba0c21eae9
SHA-256: 6ed3d2f2de8d88d6487299d5032f48249fe42b5ba775fd8ca617eab0dbb039f8
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
java-1.7.0-openjdk-1.7.0.9-2.3.5.3.el6_3.src.rpm
File outdated by:  RHSA-2014:0406
    MD5: 9c2ea39df49d72751552409adfdd869a
SHA-256: 4dafc55dfbc10eb80d5b94acb68c282c45185830f81d847fb21f030c2a590660
 
IA-32:
java-1.7.0-openjdk-1.7.0.9-2.3.5.3.el6_3.i686.rpm
File outdated by:  RHSA-2014:0406
    MD5: 1ec3c4bbbd9131c049ba44780b8bf60b
SHA-256: 4cb436cb522efc488395ab52a94aa606e6daee589495aefc428e887f849ca5bb
java-1.7.0-openjdk-debuginfo-1.7.0.9-2.3.5.3.el6_3.i686.rpm
File outdated by:  RHSA-2014:0406
    MD5: 8bb5d14dd0173dc178d2ba57224fe9c0
SHA-256: 53d15bbba7d60ae10fccfa3e6fc16b34a9a49858f2013b7876efeb3298f52708
java-1.7.0-openjdk-demo-1.7.0.9-2.3.5.3.el6_3.i686.rpm
File outdated by:  RHSA-2014:0406
    MD5: d48232409b2527aae237ea10f6806d28
SHA-256: b7489b7bd92540734081ce71c5b9e9bbcea16c84b3ac3f0a7c275149b711a3f7
java-1.7.0-openjdk-devel-1.7.0.9-2.3.5.3.el6_3.i686.rpm
File outdated by:  RHSA-2014:0406
    MD5: 554e46c3609d9e7ad1e6227b628e4dc2
SHA-256: 1880b7fb2002c835561a360f4694155e4b5071f79e5931329cc3d46dd53480d0
java-1.7.0-openjdk-javadoc-1.7.0.9-2.3.5.3.el6_3.noarch.rpm
File outdated by:  RHSA-2013:1451
    MD5: 4f881dfab88dde99adf3d144181ce3dd
SHA-256: d07ae6504cff39f0e7759951c412b46bd610585e0021d567e26c3e0a962f09b5
java-1.7.0-openjdk-src-1.7.0.9-2.3.5.3.el6_3.i686.rpm
File outdated by:  RHSA-2014:0406
    MD5: 671e83360bfc161f0b5d3f49df3bff87
SHA-256: f81affa2b147e8c6a724692c14d88d5702bad46ca03636e1946d99641547efe6
 
x86_64:
java-1.7.0-openjdk-1.7.0.9-2.3.5.3.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0406
    MD5: 073646640bc2eed8dbb854af2bd7182b
SHA-256: 4f01709f2131f8e556fd7858ece1c603d8eca0954f5ddf09faa174c892ca90c9
java-1.7.0-openjdk-debuginfo-1.7.0.9-2.3.5.3.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0406
    MD5: 808bbf14cc1ed556c630ec847a5d0b18
SHA-256: 9bf07ab644a372f7c3589cd449bd345959626958942a211c54e498d550a8090a
java-1.7.0-openjdk-demo-1.7.0.9-2.3.5.3.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0406
    MD5: 097d2a199e71c43d4363737f53a5709a
SHA-256: 86bac5a5c2fee2e9f382eb64d8150c824658c8b51be83e8f516477b52f812180
java-1.7.0-openjdk-devel-1.7.0.9-2.3.5.3.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0406
    MD5: a825dfa936f2114ed598cac9d7ed7f82
SHA-256: 39c1bad94b94551252c41820edc68d579dcc364cdc6c1f689422b457b5df562e
java-1.7.0-openjdk-javadoc-1.7.0.9-2.3.5.3.el6_3.noarch.rpm
File outdated by:  RHSA-2013:1451
    MD5: 4f881dfab88dde99adf3d144181ce3dd
SHA-256: d07ae6504cff39f0e7759951c412b46bd610585e0021d567e26c3e0a962f09b5
java-1.7.0-openjdk-src-1.7.0.9-2.3.5.3.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0406
    MD5: a6ed4dca01083705a968f5ba0c21eae9
SHA-256: 6ed3d2f2de8d88d6487299d5032f48249fe42b5ba775fd8ca617eab0dbb039f8
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

859140 - CVE-2013-0440 OpenJDK: CPU consumption DoS via repeated SSL ClientHello packets (JSSE, 7192393)
860652 - CVE-2013-1475 OpenJDK: IIOP type reuse sandbox bypass (CORBA, 8000540, SE-2012-01 Issue 50)
906447 - CVE-2013-0431 OpenJDK: JMX Introspector missing package access check (JMX, 8000539, SE-2012-01 Issue 52)
906813 - CVE-2013-0424 OpenJDK: RMI CGIHandler XSS issue (RMI, 6563318)
906892 - CVE-2013-0435 OpenJDK: com.sun.xml.internal.* not restricted packages (JAX-WS, 7201068)
906894 - CVE-2013-1478 OpenJDK: image parser insufficient raster parameter checks (2D, 8001972)
906899 - CVE-2013-0442 OpenJDK: insufficient privilege checking issue (AWT, 7192977)
906900 - CVE-2013-0445 OpenJDK: insufficient privilege checking issue (AWT, 8001057)
906904 - CVE-2013-1480 OpenJDK: image parser insufficient raster parameter checks (AWT, 8002325)
906911 - CVE-2013-0450 OpenJDK: RequiredModelMBean missing access control context checks (JMX, 8000537)
907207 - CVE-2013-0428 OpenJDK: reflection API incorrect checks for proxy classes (Libraries, 7197546, SE-2012-01 Issue 29)
907218 - CVE-2013-0444 OpenJDK: MethodFinder insufficient checks for cached results (Beans, 7200493)
907219 - CVE-2013-0432 OpenJDK: insufficient clipboard access premission checks (AWT, 7186952)
907340 - CVE-2013-0443 OpenJDK: insufficient Diffie-Hellman public key checks (JSSE, 7192392)
907344 - CVE-2013-0425 OpenJDK: logging insufficient access control checks (Libraries, 6664509)
907346 - CVE-2013-0426 OpenJDK: logging insufficient access control checks (Libraries, 6664528)
907453 - CVE-2013-0434 OpenJDK: loadPropertyFile missing restrictions (JAXP, 8001235)
907455 - CVE-2013-0427 OpenJDK: invalid threads subject to interrupts (Libraries, 6776941)
907456 - CVE-2013-0433 OpenJDK: InetSocketAddress serialization issue (Networking, 7201071)
907457 - CVE-2013-1476 OpenJDK: missing ValueHandlerImpl class constructor access restriction (CORBA, 8000631)
907458 - CVE-2013-0441 OpenJDK: missing serialization restriction (CORBA, 7201066)
907460 - CVE-2013-0429 OpenJDK: PresentationManager incorrectly shared (CORBA, 7141694)


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/