Important CentOS java-1.7.0-openjdk Update

Metadata

critical
10.0
java-1.7.0-openjdk-1.7.0.5-2.2.1.el6_3.3.i686.rpm, java-1.7.0-openjdk-1.7.0.5-2.2.1.el6_3.3.src.rpm, java-1.7.0-openjdk-1.7.0.5-2.2.1.el6_3.3.x86_64.rpm, java-1.7.0-openjdk-demo-1.7.0.5-2.2.1.el6_3.3.i686.rpm, java-1.7.0-openjdk-demo-1.7.0.5-2.2.1.el6_3.3.x86_64.rpm, java-1.7.0-openjdk-devel-1.7.0.5-2.2.1.el6_3.3.i686.rpm, java-1.7.0-openjdk-devel-1.7.0.5-2.2.1.el6_3.3.x86_64.rpm, java-1.7.0-openjdk-javadoc-1.7.0.5-2.2.1.el6_3.3.noarch.rpm, java-1.7.0-openjdk-src-1.7.0.5-2.2.1.el6_3.3.i686.rpm, java-1.7.0-openjdk-src-1.7.0.5-2.2.1.el6_3.3.x86_64.rpm
CVE-2012-0547, CVE-2012-1682, CVE-2012-3136, CVE-2012-4681
rhn.redhat.com, lists.centos.org
2012-09-03
2017-07-27 19:04
ALAS-2012-119
Important CentOS java-1.6.0-openjdk Update
Critical CentOS java-1.6.0-openjdk Update
CVE-2012-3136 openjdk-6
CVE-2012-4681 openjdk-6
CVE-2012-4681 openjdk-7
CVE-2012-0547 openjdk-6
CVE-2012-1682 openjdk-7
CVE-2012-3136 openjdk-7
CVE-2012-0547 openjdk-7
CVE-2012-3136
CVE-2012-1682
CVE-2012-4681
CVE-2012-0547
2017-04-01 19:06
2017-01-05 20:10

Description


Updated java-1.7.0-openjdk packages that fix several security issues are
now available for Red Hat Enterprise Linux 6.

The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

These packages provide the OpenJDK 7 Java Runtime Environment and the
OpenJDK 7 Software Development Kit.

Multiple improper permission check issues were discovered in the Beans
component in OpenJDK. An untrusted Java application or applet could use
these flaws to bypass Java sandbox restrictions. (CVE-2012-4681,
CVE-2012-1682, CVE-2012-3136)

A hardening fix was applied to the AWT component in OpenJDK, removing
functionality from the restricted SunToolkit class that was used in
combination with other flaws to bypass Java sandbox restrictions.
(CVE-2012-0547)

All users of java-1.7.0-openjdk are advised to upgrade to these updated
packages, which resolve these issues. All running instances of OpenJDK Java
must be restarted for the update to take effect.
Please see https://www.redhat.com/footer/terms-of-use.html

Am I vulnerable?

The constraints below list the versions that this vulnerability is patched in, and versions that are unaffected. If a patch is ready but unrealeased, then it is pending.

Or, you can just let us figure it out for you! Appcanary continously monitor your installed packages, and tell you if any of them are vulnerable.

Sign up for monitoring

Affected package information

Release Package Patched in
6 java-1.7.0-openjdk java-1.7.0-openjdk-1.7.0.5-2.2.1.el6_3.3.i686.rpm
java-1.7.0-openjdk java-1.7.0-openjdk-1.7.0.5-2.2.1.el6_3.3.src.rpm
java-1.7.0-openjdk java-1.7.0-openjdk-1.7.0.5-2.2.1.el6_3.3.x86_64.rpm
java-1.7.0-openjdk-demo java-1.7.0-openjdk-demo-1.7.0.5-2.2.1.el6_3.3.i686.rpm
java-1.7.0-openjdk-demo java-1.7.0-openjdk-demo-1.7.0.5-2.2.1.el6_3.3.x86_64.rpm
java-1.7.0-openjdk-devel java-1.7.0-openjdk-devel-1.7.0.5-2.2.1.el6_3.3.i686.rpm
java-1.7.0-openjdk-devel java-1.7.0-openjdk-devel-1.7.0.5-2.2.1.el6_3.3.x86_64.rpm
java-1.7.0-openjdk-javadoc java-1.7.0-openjdk-javadoc-1.7.0.5-2.2.1.el6_3.3.noarch.rpm
java-1.7.0-openjdk-src java-1.7.0-openjdk-src-1.7.0.5-2.2.1.el6_3.3.i686.rpm
java-1.7.0-openjdk-src java-1.7.0-openjdk-src-1.7.0.5-2.2.1.el6_3.3.x86_64.rpm