Home / mailings [RHSA-2007:0818-01] Critical: java-1.5.0-sun security update
Posted on 06 August 2007
RedHat-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- ---------------------------------------------------------------------
Red Hat Security Advisory
Synopsis: Critical: java-1.5.0-sun security update
Advisory ID: RHSA-2007:0818-01
Advisory URL: https://rhn.redhat.com/errata/RHSA-2007-0818.html
Issue date: 2007-08-06
Updated on: 2007-08-06
Product: Red Hat Enterprise Linux Extras
CVE Names: CVE-2007-3503 CVE-2007-3655 CVE-2007-3698
CVE-2007-3922
- ---------------------------------------------------------------------
1. Summary:
Updated java-1.5.0-sun packages that correct several security issues are
available for Red Hat Enterprise Linux 4 Extras.
This update has been rated as having critical security impact by the Red
Hat Security Response Team.
2. Relevant releases/architectures:
Red Hat Enterprise Linux AS version 4 Extras - i386, x86_64
Red Hat Desktop version 4 Extras - i386, x86_64
Red Hat Enterprise Linux ES version 4 Extras - i386, x86_64
Red Hat Enterprise Linux WS version 4 Extras - i386, x86_64
3. Problem description:
The Java Runtime Environment (JRE) contains the software and tools
that users need to run applets and applications written using the Java
programming language.
The Javadoc tool was able to generate HTML documentation pages that
contained cross-site scripting (XSS) vulnerabilities. A remote attacker
could use this to inject arbitrary web script or HTML. (CVE-2007-3503)
The Java Web Start URL parsing component contained a buffer overflow
vulnerability within the parsing code for JNLP files. A remote attacker
could create a malicious JNLP file that could trigger this flaw and execute
arbitrary code when opened. (CVE-2007-3655)
The JSSE component did not correctly process SSL/TLS handshake requests. A
remote attacker who is able to connect to a JSSE-based service could
trigger this flaw leading to a denial-of-service. (CVE-2007-3698)
A flaw was found in the applet class loader. An untrusted applet could use
this flaw to circumvent network access restrictions, possibly connecting to
services hosted on the machine that executed the applet. (CVE-2007-3922)
All users of java-sun-1.5.0 should upgrade to these packages, which contain
Sun Java 1.5.0 Update 12 that corrects these issues.
4. Solution:
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188
5. Bug IDs fixed (http://bugzilla.redhat.com/):
246765 - CVE-2007-3503 HTML files generated with Javadoc are vulnerable to a XSS
248864 - CVE-2007-3655 A buffer overflow vulnerability in Java Web Start URL parsing code
249533 - CVE-2007-3922 Vulnerability in the Java Runtime Environment May Allow an Untrusted Applet to Circumvent Network Access Restrictions
249539 - CVE-2007-3698 Java Secure Socket Extension Does Not Correctly Process SSL/TLS Handshake Requests Resulting in a Denial of Service (DoS) Condition
6. RPMs required:
Red Hat Enterprise Linux AS version 4 Extras:
SRPMS:
ftp://updates.redhat.com/enterprise/4AS-LACD/en/os/SRPMS/java-1.5.0-sun-1.5.0.12-1jpp.2.el4.src.rpm
b7f11fc62108de501691fe189ff28d4d java-1.5.0-sun-1.5.0.12-1jpp.2.el4.src.rpm
i386:
5288f89064913e18146ab506c59b9f21 java-1.5.0-sun-1.5.0.12-1jpp.2.el4.i586.rpm
f5348203e78aa64ad19435b0648feaac java-1.5.0-sun-demo-1.5.0.12-1jpp.2.el4.i586.rpm
83ce83af56148830f7f180c3a130b2ff java-1.5.0-sun-devel-1.5.0.12-1jpp.2.el4.i586.rpm
5e35a59d97f96e946e6041029dc2c18e java-1.5.0-sun-jdbc-1.5.0.12-1jpp.2.el4.i586.rpm
e8523c770f5d5e132f805a412de1e4d4 java-1.5.0-sun-plugin-1.5.0.12-1jpp.2.el4.i586.rpm
47475bcd46e37bad046fa7eb26e75c83 java-1.5.0-sun-src-1.5.0.12-1jpp.2.el4.i586.rpm
x86_64:
c75ff10faf480c14455e17d19429e762 java-1.5.0-sun-1.5.0.12-1jpp.2.el4.x86_64.rpm
ee527a32217fb56fce9c52080959cd2a java-1.5.0-sun-demo-1.5.0.12-1jpp.2.el4.x86_64.rpm
294fbe07c37991b3757e30926b1b9c46 java-1.5.0-sun-devel-1.5.0.12-1jpp.2.el4.x86_64.rpm
8280e5a0c39c55fd8c4cedf1ad0f8b23 java-1.5.0-sun-jdbc-1.5.0.12-1jpp.2.el4.x86_64.rpm
60247d67a91aac8d1bc998c4a076bfab java-1.5.0-sun-src-1.5.0.12-1jpp.2.el4.x86_64.rpm
Red Hat Desktop version 4 Extras:
SRPMS:
ftp://updates.redhat.com/enterprise/4Desktop-LACD/en/os/SRPMS/java-1.5.0-sun-1.5.0.12-1jpp.2.el4.src.rpm
b7f11fc62108de501691fe189ff28d4d java-1.5.0-sun-1.5.0.12-1jpp.2.el4.src.rpm
i386:
5288f89064913e18146ab506c59b9f21 java-1.5.0-sun-1.5.0.12-1jpp.2.el4.i586.rpm
f5348203e78aa64ad19435b0648feaac java-1.5.0-sun-demo-1.5.0.12-1jpp.2.el4.i586.rpm
83ce83af56148830f7f180c3a130b2ff java-1.5.0-sun-devel-1.5.0.12-1jpp.2.el4.i586.rpm
5e35a59d97f96e946e6041029dc2c18e java-1.5.0-sun-jdbc-1.5.0.12-1jpp.2.el4.i586.rpm
e8523c770f5d5e132f805a412de1e4d4 java-1.5.0-sun-plugin-1.5.0.12-1jpp.2.el4.i586.rpm
47475bcd46e37bad046fa7eb26e75c83 java-1.5.0-sun-src-1.5.0.12-1jpp.2.el4.i586.rpm
x86_64:
c75ff10faf480c14455e17d19429e762 java-1.5.0-sun-1.5.0.12-1jpp.2.el4.x86_64.rpm
ee527a32217fb56fce9c52080959cd2a java-1.5.0-sun-demo-1.5.0.12-1jpp.2.el4.x86_64.rpm
294fbe07c37991b3757e30926b1b9c46 java-1.5.0-sun-devel-1.5.0.12-1jpp.2.el4.x86_64.rpm
8280e5a0c39c55fd8c4cedf1ad0f8b23 java-1.5.0-sun-jdbc-1.5.0.12-1jpp.2.el4.x86_64.rpm
60247d67a91aac8d1bc998c4a076bfab java-1.5.0-sun-src-1.5.0.12-1jpp.2.el4.x86_64.rpm
Red Hat Enterprise Linux ES version 4 Extras:
SRPMS:
ftp://updates.redhat.com/enterprise/4ES-LACD/en/os/SRPMS/java-1.5.0-sun-1.5.0.12-1jpp.2.el4.src.rpm
b7f11fc62108de501691fe189ff28d4d java-1.5.0-sun-1.5.0.12-1jpp.2.el4.src.rpm
i386:
5288f89064913e18146ab506c59b9f21 java-1.5.0-sun-1.5.0.12-1jpp.2.el4.i586.rpm
f5348203e78aa64ad19435b0648feaac java-1.5.0-sun-demo-1.5.0.12-1jpp.2.el4.i586.rpm
83ce83af56148830f7f180c3a130b2ff java-1.5.0-sun-devel-1.5.0.12-1jpp.2.el4.i586.rpm
5e35a59d97f96e946e6041029dc2c18e java-1.5.0-sun-jdbc-1.5.0.12-1jpp.2.el4.i586.rpm
e8523c770f5d5e132f805a412de1e4d4 java-1.5.0-sun-plugin-1.5.0.12-1jpp.2.el4.i586.rpm
47475bcd46e37bad046fa7eb26e75c83 java-1.5.0-sun-src-1.5.0.12-1jpp.2.el4.i586.rpm
x86_64:
c75ff10faf480c14455e17d19429e762 java-1.5.0-sun-1.5.0.12-1jpp.2.el4.x86_64.rpm
ee527a32217fb56fce9c52080959cd2a java-1.5.0-sun-demo-1.5.0.12-1jpp.2.el4.x86_64.rpm
294fbe07c37991b3757e30926b1b9c46 java-1.5.0-sun-devel-1.5.0.12-1jpp.2.el4.x86_64.rpm
8280e5a0c39c55fd8c4cedf1ad0f8b23 java-1.5.0-sun-jdbc-1.5.0.12-1jpp.2.el4.x86_64.rpm
60247d67a91aac8d1bc998c4a076bfab java-1.5.0-sun-src-1.5.0.12-1jpp.2.el4.x86_64.rpm
Red Hat Enterprise Linux WS version 4 Extras:
SRPMS:
ftp://updates.redhat.com/enterprise/4WS-LACD/en/os/SRPMS/java-1.5.0-sun-1.5.0.12-1jpp.2.el4.src.rpm
b7f11fc62108de501691fe189ff28d4d java-1.5.0-sun-1.5.0.12-1jpp.2.el4.src.rpm
i386:
5288f89064913e18146ab506c59b9f21 java-1.5.0-sun-1.5.0.12-1jpp.2.el4.i586.rpm
f5348203e78aa64ad19435b0648feaac java-1.5.0-sun-demo-1.5.0.12-1jpp.2.el4.i586.rpm
83ce83af56148830f7f180c3a130b2ff java-1.5.0-sun-devel-1.5.0.12-1jpp.2.el4.i586.rpm
5e35a59d97f96e946e6041029dc2c18e java-1.5.0-sun-jdbc-1.5.0.12-1jpp.2.el4.i586.rpm
e8523c770f5d5e132f805a412de1e4d4 java-1.5.0-sun-plugin-1.5.0.12-1jpp.2.el4.i586.rpm
47475bcd46e37bad046fa7eb26e75c83 java-1.5.0-sun-src-1.5.0.12-1jpp.2.el4.i586.rpm
x86_64:
c75ff10faf480c14455e17d19429e762 java-1.5.0-sun-1.5.0.12-1jpp.2.el4.x86_64.rpm
ee527a32217fb56fce9c52080959cd2a java-1.5.0-sun-demo-1.5.0.12-1jpp.2.el4.x86_64.rpm
294fbe07c37991b3757e30926b1b9c46 java-1.5.0-sun-devel-1.5.0.12-1jpp.2.el4.x86_64.rpm
8280e5a0c39c55fd8c4cedf1ad0f8b23 java-1.5.0-sun-jdbc-1.5.0.12-1jpp.2.el4.x86_64.rpm
60247d67a91aac8d1bc998c4a076bfab java-1.5.0-sun-src-1.5.0.12-1jpp.2.el4.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package
7. References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3503
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3655
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3698
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3922
http://www.redhat.com/security/updates/classification/#critical
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://www.redhat.com/security/team/contact/
Copyright 2007 Red Hat, Inc.