Bug 1019300 (CVE-2013-5838)

Summary: CVE-2013-5838 OpenJDK: Vulnerability in Libraries component (Libraries, 7023639)
Product: [Other] Security Response Reporter: Stefan Cornelius <scorneli>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: urgent Docs Contact:
Priority: urgent    
Version: unspecifiedCC: dbhole, jkurik, jvanek, security-response-team
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: icedtea 2.4.3 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2013-11-13 15:58:32 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 1017632    

Description Stefan Cornelius 2013-10-15 12:48:54 UTC
A vulnerability in the Libraries component can be exploited by remote attackers to affect confidentiality, integrity and availability.

Comment 1 Tomas Hoger 2013-10-15 19:07:20 UTC
Upstream associates this with upstream bug id 7023639.  The related commit is:

http://hg.openjdk.java.net/jdk7u/jdk7u/jdk/rev/6e34c6d3479f

which references the following upstream bugs:

http://bugs.sun.com/bugdatabase/view_bug.do?bug_id=7023639
http://bugs.sun.com/bugdatabase/view_bug.do?bug_id=6984705

related to implementation of JSR-292 "Supporting Dynamically Typed Languages on the JavaTM Platform":

http://jcp.org/en/jsr/detail?id=292

The change was included in Oracle JDK 7u40.

A security issue addressed by this change is not specified.

Comment 3 Tomas Hoger 2013-10-16 11:05:50 UTC
Fixed in Oracle Java SE 7u45.

Comment 5 errata-xmlrpc 2013-10-17 17:42:49 UTC
This issue has been addressed in following products:

  Supplementary for Red Hat Enterprise Linux 6
  Supplementary for Red Hat Enterprise Linux 5

Via RHSA-2013:1440 https://rhn.redhat.com/errata/RHSA-2013-1440.html

Comment 6 Tomas Hoger 2013-10-18 19:46:47 UTC
Further details of the issue were posted by Adam Gowdiak (Security Explorations), along with the example exploit:

http://seclists.org/fulldisclosure/2013/Oct/116
http://www.security-explorations.com/materials/SE-2012-01-ORACLE-13.pdf
http://www.security-explorations.com/materials/se-2012-01-69.zip

Comment 7 errata-xmlrpc 2013-10-21 17:48:32 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5

Via RHSA-2013:1447 https://rhn.redhat.com/errata/RHSA-2013-1447.html

Comment 8 errata-xmlrpc 2013-10-22 17:24:41 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 6

Via RHSA-2013:1451 https://rhn.redhat.com/errata/RHSA-2013-1451.html

Comment 9 errata-xmlrpc 2013-11-07 17:13:25 UTC
This issue has been addressed in following products:

  Supplementary for Red Hat Enterprise Linux 5
  Supplementary for Red Hat Enterprise Linux 6

Via RHSA-2013:1507 https://rhn.redhat.com/errata/RHSA-2013-1507.html

Comment 10 Tomas Hoger 2013-11-13 15:58:32 UTC
Fixed in IcedTea7 2.4.3:

http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2013-October/025087.html


Note that this will not be fixed in IcedTea7 2.3.x versions.  Quoting from the above 2.4.3 announcement:

  Existing users of the 2.3.x series are strongly advised to upgrade to
  the 2.4.x series.  Although there will be a 2.3.x update, one security
  issue (CVE-2013-5838) is resolved by the JSR292 rewrite (S7023639)
  which is present in the 2.4.x series, but not 2.3.x.  It may or may
  not be possible to backport this for the Zero port, but the safest
  solution is to use 2.4.x where possible.