- Issued:
- 2016-04-21
- Updated:
- 2016-04-21
RHSA-2016:0675 - Critical: java-1.7.0-openjdk security update
Synopsis
Critical: java-1.7.0-openjdk security update
Type/Severity
Security Advisory Critical
Topic
An update for java-1.7.0-openjdk is now available for Red Hat Enterprise Linux 6.
Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The java-1.7.0-openjdk packages provide the OpenJDK 7 Java Runtime Environment and the OpenJDK 7 Java Software Development Kit.
Security Fix(es):
-
Multiple flaws were discovered in the Serialization and Hotspot components in OpenJDK. An untrusted Java application or applet could use these flaws to completely bypass Java sandbox restrictions. (CVE-2016-0686, CVE-2016-0687)
-
It was discovered that the RMI server implementation in the JMX component in OpenJDK did not restrict which classes can be deserialized when deserializing authentication credentials. A remote, unauthenticated attacker able to connect to a JMX port could possibly use this flaw to trigger deserialization flaws. (CVE-2016-3427)
-
It was discovered that the JAXP component in OpenJDK failed to properly handle Unicode surrogate pairs used as part of the XML attribute values. Specially crafted XML input could cause a Java application to use an excessive amount of memory when parsed. (CVE-2016-3425)
-
It was discovered that the Security component in OpenJDK failed to check the digest algorithm strength when generating DSA signatures. The use of a digest weaker than the key strength could lead to the generation of signatures that were weaker than expected. (CVE-2016-0695)
Note: If the web browser plug-in provided by the icedtea-web package was installed, the issues exposed via Java applets could have been exploited without user interaction if a user visited a malicious website.
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
All running instances of OpenJDK Java must be restarted for this update to take effect.
Affected Products
| Product | Version | Arch |
|---|---|---|
| Red Hat Enterprise Linux for x86_64 - Extended Update Support | 6.7 | x86_64 |
| Red Hat Enterprise Linux for x86_64 - Extended Update Support | 6.7 | i386 |
| Red Hat Enterprise Linux for Scientific Computing | 6 | x86_64 |
| Red Hat Enterprise Linux for SAP Solutions for x86_64 - Extended Update Support | 6.7 | x86_64 |
| Red Hat Enterprise Linux Workstation | 6 | x86_64 |
| Red Hat Enterprise Linux Workstation | 6 | i386 |
| Red Hat Enterprise Linux Server | 6 | x86_64 |
| Red Hat Enterprise Linux Server | 6 | i386 |
| Red Hat Enterprise Linux Server from RHUI | 6 | x86_64 |
| Red Hat Enterprise Linux Server from RHUI | 6 | i386 |
| Red Hat Enterprise Linux Server - Retired Extended Life Cycle Support | 6 | x86_64 |
| Red Hat Enterprise Linux Server - Extended Update Support from RHUI | 6.7 | x86_64 |
| Red Hat Enterprise Linux Server - Extended Update Support from RHUI | 6.7 | i386 |
| Red Hat Enterprise Linux Server - Extended Life Cycle Support | 6 | x86_64 |
| Red Hat Enterprise Linux Server - Extended Life Cycle Support | 6 | i386 |
| Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension | 6 | x86_64 |
| Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension | 6 | i386 |
| Red Hat Enterprise Linux EUS Compute Node | 6.7 | x86_64 |
| Red Hat Enterprise Linux Desktop | 6 | x86_64 |
| Red Hat Enterprise Linux Desktop | 6 | i386 |
Updated Packages
- java-1.7.0-openjdk-demo-1.7.0.101-2.6.6.1.el6_7.x86_64.rpm
- java-1.7.0-openjdk-debuginfo-1.7.0.101-2.6.6.1.el6_7.i686.rpm
- java-1.7.0-openjdk-javadoc-1.7.0.101-2.6.6.1.el6_7.noarch.rpm
- java-1.7.0-openjdk-1.7.0.101-2.6.6.1.el6_7.src.rpm
- java-1.7.0-openjdk-devel-1.7.0.101-2.6.6.1.el6_7.i686.rpm
- java-1.7.0-openjdk-devel-1.7.0.101-2.6.6.1.el6_7.x86_64.rpm
- java-1.7.0-openjdk-1.7.0.101-2.6.6.1.el6_7.x86_64.rpm
- java-1.7.0-openjdk-demo-1.7.0.101-2.6.6.1.el6_7.i686.rpm
- java-1.7.0-openjdk-src-1.7.0.101-2.6.6.1.el6_7.i686.rpm
- java-1.7.0-openjdk-src-1.7.0.101-2.6.6.1.el6_7.x86_64.rpm
- java-1.7.0-openjdk-1.7.0.101-2.6.6.1.el6_7.i686.rpm
- java-1.7.0-openjdk-debuginfo-1.7.0.101-2.6.6.1.el6_7.x86_64.rpm
Fixes
- This content is not included.BZ - 1327743
- This content is not included.BZ - 1327749
- This content is not included.BZ - 1328022
- This content is not included.BZ - 1328040
- This content is not included.BZ - 1328210
CVEs
References
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.