Chapter 1. Package Updates
106
1.103. java-1.6.0-openjdk
1.103.1. RHSA-2009:1201: Important security and bug fix update
Important
This update has already been released (prior to the GA of this release) as the security
errata
RHSA-2009:1201
689
Updated java-1.6.0-openjdk packages that fix several security issues and a bug are now available for
Red Hat Enterprise Linux 5.
This update has been rated as having important security impact by the Red Hat Security Response
Team.
These packages provide the OpenJDK 6 Java Runtime Environment and the OpenJDK 6 Software
Development Kit. The Java Runtime Environment (JRE) contains the software and tools that users
need to run applications written using the Java programming language.
A flaw was found in the way the XML Digital Signature implementation in the JRE handled HMAC-
based XML signatures. An attacker could use this flaw to create a crafted signature that could allow
them to bypass authentication, or trick a user, applet, or application into accepting untrusted content.
(
CVE-2009-0217
690
)
Several potential information leaks were found in various mutable static variables. These could be
exploited in application scenarios that execute untrusted scripting code. (
CVE-2009-2475
691
)
It was discovered that OpenType checks can be bypassed. This could allow a rogue application to
bypass access restrictions by acquiring references to privileged objects through finalizer resurrection.
(
CVE-2009-2476
692
)
A denial of service flaw was found in the way the JRE processes XML. A remote attacker could use
this flaw to supply crafted XML that would lead to a denial of service. (
CVE-2009-2625
693
)
A flaw was found in the JRE audio system. An untrusted applet or application could use this flaw to
gain read access to restricted System properties. (
CVE-2009-2670
694
)
Two flaws were found in the JRE proxy implementation. An untrusted applet or application could
use these flaws to discover the usernames of users running applets and applications, or obtain web
browser cookies and use them for session hijacking attacks. (
CVE-2009-2671
695
,
CVE-2009-2672
696
)
An additional flaw was found in the proxy mechanism implementation. This flaw allowed an untrusted
applet or application to bypass access restrictions and communicate using non-authorized socket or
URL connections to hosts other than the origin host. (
CVE-2009-2673
697
)
690
https://www.redhat.com/security/data/cve/CVE-2009-0217.html
691
https://www.redhat.com/security/data/cve/CVE-2009-2475.html
692
https://www.redhat.com/security/data/cve/CVE-2009-2476.html
693
https://www.redhat.com/security/data/cve/CVE-2009-2625.html
694
https://www.redhat.com/security/data/cve/CVE-2009-2670.html
695
https://www.redhat.com/security/data/cve/CVE-2009-2671.html
696
https://www.redhat.com/security/data/cve/CVE-2009-2672.html
697
https://www.redhat.com/security/data/cve/CVE-2009-2673.html
Summary of Contents for ENTERPRISE 5.4 RELEASE NOTES
Page 1: ...Red Hat Enterprise Linux 5 4 Technical Notes Every Change to Every Package ...
Page 18: ...xviii ...
Page 306: ...288 ...
Page 464: ...446 ...
Page 466: ...448 ...