Synopsis:          Important: java-1.6.0-openjdk security update
Advisory ID:       SLSA-2014:0097-1
Issue Date:        2014-01-27
CVE Numbers:       CVE-2014-0428
                   CVE-2014-0422
                   CVE-2014-0373
                   CVE-2013-5878
                   CVE-2013-5884
                   CVE-2014-0416
                   CVE-2014-0376
                   CVE-2013-5907
                   CVE-2014-0368
                   CVE-2013-5910
                   CVE-2014-0411
                   CVE-2014-0423
                   CVE-2013-5896
--

An input validation flaw was discovered in the font layout engine in the
2D component. A specially crafted font file could trigger a Java Virtual
Machine memory corruption when processed. An untrusted Java application or
applet could possibly use this flaw to bypass Java sandbox restrictions.
(CVE-2013-5907)

Multiple improper permission check issues were discovered in the CORBA and
JNDI components in OpenJDK. An untrusted Java application or applet could
use these flaws to bypass Java sandbox restrictions. (CVE-2014-0428,
CVE-2014-0422)

Multiple improper permission check issues were discovered in the
Serviceability, Security, CORBA, JAAS, JAXP, and Networking components in
OpenJDK. An untrusted Java application or applet could use these flaws to
bypass certain Java sandbox restrictions. (CVE-2014-0373, CVE-2013-5878,
CVE-2013-5910, CVE-2013-5896, CVE-2013-5884, CVE-2014-0416, CVE-2014-0376,
CVE-2014-0368)

It was discovered that the Beans component did not restrict processing of
XML external entities. This flaw could cause a Java application using
Beans to leak sensitive information, or affect application availability.
(CVE-2014-0423)

It was discovered that the JSSE component could leak timing information
during the TLS/SSL handshake. This could possibly lead to a disclosure of
information about the used encryption keys. (CVE-2014-0411)

All running instances of OpenJDK Java must be restarted for the update to
take effect.
--

SL5
  x86_64
    java-1.6.0-openjdk-1.6.0.0-3.1.13.1.el5_10.x86_64.rpm
    java-1.6.0-openjdk-debuginfo-1.6.0.0-3.1.13.1.el5_10.x86_64.rpm
    java-1.6.0-openjdk-demo-1.6.0.0-3.1.13.1.el5_10.x86_64.rpm
    java-1.6.0-openjdk-devel-1.6.0.0-3.1.13.1.el5_10.x86_64.rpm
    java-1.6.0-openjdk-javadoc-1.6.0.0-3.1.13.1.el5_10.x86_64.rpm
    java-1.6.0-openjdk-src-1.6.0.0-3.1.13.1.el5_10.x86_64.rpm
  i386
    java-1.6.0-openjdk-1.6.0.0-3.1.13.1.el5_10.i386.rpm
    java-1.6.0-openjdk-debuginfo-1.6.0.0-3.1.13.1.el5_10.i386.rpm
    java-1.6.0-openjdk-demo-1.6.0.0-3.1.13.1.el5_10.i386.rpm
    java-1.6.0-openjdk-devel-1.6.0.0-3.1.13.1.el5_10.i386.rpm
    java-1.6.0-openjdk-javadoc-1.6.0.0-3.1.13.1.el5_10.i386.rpm
    java-1.6.0-openjdk-src-1.6.0.0-3.1.13.1.el5_10.i386.rpm
SL6
  x86_64
    java-1.6.0-openjdk-1.6.0.0-3.1.13.1.el6_5.x86_64.rpm
    java-1.6.0-openjdk-debuginfo-1.6.0.0-3.1.13.1.el6_5.x86_64.rpm
    java-1.6.0-openjdk-demo-1.6.0.0-3.1.13.1.el6_5.x86_64.rpm
    java-1.6.0-openjdk-devel-1.6.0.0-3.1.13.1.el6_5.x86_64.rpm
    java-1.6.0-openjdk-javadoc-1.6.0.0-3.1.13.1.el6_5.x86_64.rpm
    java-1.6.0-openjdk-src-1.6.0.0-3.1.13.1.el6_5.x86_64.rpm
  i386
    java-1.6.0-openjdk-1.6.0.0-3.1.13.1.el6_5.i686.rpm
    java-1.6.0-openjdk-debuginfo-1.6.0.0-3.1.13.1.el6_5.i686.rpm
    java-1.6.0-openjdk-demo-1.6.0.0-3.1.13.1.el6_5.i686.rpm
    java-1.6.0-openjdk-devel-1.6.0.0-3.1.13.1.el6_5.i686.rpm
    java-1.6.0-openjdk-javadoc-1.6.0.0-3.1.13.1.el6_5.i686.rpm
    java-1.6.0-openjdk-src-1.6.0.0-3.1.13.1.el6_5.i686.rpm

- Scientific Linux Development Team