The AtomicReferenceArray class implementation did not properly check if the array is of an expected Object[] type. A malicious Java application or applet could use this flaw to cause Java Virtual Machine to crash or bypass Java sandbox restrictions.
External Reference: http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html
This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2012:0135 https://rhn.redhat.com/errata/RHSA-2012-0135.html
Patches were applied in following IcedTea versions: * IcedTea6 1.8.13 (based on OpenJDK6 b18) * IcedTea6 1.9.13 (based on OpenJDK6 b20) * IcedTea6 1.10.6 (based on OpenJDK6 b22) * IcedTea6 1.11.1 (based on OpenJDK6 b24) * IcedTea 2.0.1 (based on OpenJDK7 u1 + u3 security patches) http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2012-February/017249.html http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2012-February/017233.html Patch: http://icedtea.classpath.org/hg/release/icedtea6-1.10/file/4e7a700d4ecc/patches/security/20120214/7082299.patch
Adding JDK7 fix link for the sake of completeness: http://icedtea.classpath.org/hg/release/icedtea7-forest-2.0/jdk/rev/d063a88899f9
This issue has been addressed in following products: Extras for RHEL 4 Supplementary for Red Hat Enterprise Linux 5 Supplementary for Red Hat Enterprise Linux 6 Via RHSA-2012:0139 https://rhn.redhat.com/errata/RHSA-2012-0139.html
This issue has been addressed in following products: Red Hat Enterprise Linux 5 Via RHSA-2012:0322 https://rhn.redhat.com/errata/RHSA-2012-0322.html
Write up with more details of the flaw: http://weblog.ikvm.net/PermaLink.aspx?guid=cd48169a-9405-4f63-9087-798c4a1866d3
Oracle CPU page was updated to note new CVE for this issue, see "Modification History": 2012-February-17 Rev 2. Replaced CVE-2011-3571 with CVE-2012-0507 http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html Updating this bug accordingly.
Additional references, pointing out this flaw is being actively used to exploit users with outdated JRE that visit malicious web sites: http://www.h-online.com/security/news/item/Critical-Java-hole-being-exploited-on-a-large-scale-Update-1485681.html http://krebsonsecurity.com/2012/03/new-java-attack-rolled-into-exploit-packs/ http://blogs.technet.com/b/mmpc/archive/2012/03/20/an-interesting-case-of-jre-sandbox-breach-cve-2012-0507.aspx
This issue has been addressed in following products: Supplementary for Red Hat Enterprise Linux 5 Supplementary for Red Hat Enterprise Linux 6 Via RHSA-2012:0508 https://rhn.redhat.com/errata/RHSA-2012-0508.html
This issue has been addressed in following products: Supplementary for Red Hat Enterprise Linux 5 Supplementary for Red Hat Enterprise Linux 6 Via RHSA-2012:0514 https://rhn.redhat.com/errata/RHSA-2012-0514.html
This issue has been addressed in following products: Red Hat Network Satellite Server v 5.4 Via RHSA-2013:1455 https://rhn.redhat.com/errata/RHSA-2013-1455.html