Bug 1019300 (CVE-2013-5838)

Summary: CVE-2013-5838 OpenJDK: Vulnerability in Libraries component (Libraries, 7023639)
Product: [Other] Security Response Reporter: Stefan Cornelius <scorneli>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: urgent Docs Contact:
Priority: urgent    
Version: unspecifiedCC: dbhole, jkurik, jvanek, security-response-team
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard: impact=critical,public=20131015,reported=20131009,source=oracle,cvss2=6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P,rhel-5/java-1.6.0-openjdk=affected,rhel-6/java-1.6.0-openjdk=affected,rhel-5/java-1.7.0-openjdk=affected,rhel-6/java-1.7.0-openjdk=affected,rhel-5/java-1.7.0-oracle=affected,rhel-6/java-1.7.0-oracle=affected
Fixed In Version: icedtea 2.4.3 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2013-11-13 10:58:32 EST Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---
Bug Depends On:    
Bug Blocks: 1017595, 1017632    

Description Stefan Cornelius 2013-10-15 08:48:54 EDT
A vulnerability in the Libraries component can be exploited by remote attackers to affect confidentiality, integrity and availability.
Comment 1 Tomas Hoger 2013-10-15 15:07:20 EDT
Upstream associates this with upstream bug id 7023639.  The related commit is:


which references the following upstream bugs:


related to implementation of JSR-292 "Supporting Dynamically Typed Languages on the JavaTM Platform":


The change was included in Oracle JDK 7u40.

A security issue addressed by this change is not specified.
Comment 3 Tomas Hoger 2013-10-16 07:05:50 EDT
Fixed in Oracle Java SE 7u45.
Comment 5 errata-xmlrpc 2013-10-17 13:42:49 EDT
This issue has been addressed in following products:

  Supplementary for Red Hat Enterprise Linux 6
  Supplementary for Red Hat Enterprise Linux 5

Via RHSA-2013:1440 https://rhn.redhat.com/errata/RHSA-2013-1440.html
Comment 6 Tomas Hoger 2013-10-18 15:46:47 EDT
Further details of the issue were posted by Adam Gowdiak (Security Explorations), along with the example exploit:

Comment 7 errata-xmlrpc 2013-10-21 13:48:32 EDT
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5

Via RHSA-2013:1447 https://rhn.redhat.com/errata/RHSA-2013-1447.html
Comment 8 errata-xmlrpc 2013-10-22 13:24:41 EDT
This issue has been addressed in following products:

  Red Hat Enterprise Linux 6

Via RHSA-2013:1451 https://rhn.redhat.com/errata/RHSA-2013-1451.html
Comment 9 errata-xmlrpc 2013-11-07 12:13:25 EST
This issue has been addressed in following products:

  Supplementary for Red Hat Enterprise Linux 5
  Supplementary for Red Hat Enterprise Linux 6

Via RHSA-2013:1507 https://rhn.redhat.com/errata/RHSA-2013-1507.html
Comment 10 Tomas Hoger 2013-11-13 10:58:32 EST
Fixed in IcedTea7 2.4.3:


Note that this will not be fixed in IcedTea7 2.3.x versions.  Quoting from the above 2.4.3 announcement:

  Existing users of the 2.3.x series are strongly advised to upgrade to
  the 2.4.x series.  Although there will be a 2.3.x update, one security
  issue (CVE-2013-5838) is resolved by the JSR292 rewrite (S7023639)
  which is present in the 2.4.x series, but not 2.3.x.  It may or may
  not be possible to backport this for the Zero port, but the safest
  solution is to use 2.4.x where possible.