A flaw was found in the Java API for XML Processing (JAXP) XML parser. An attacker able to make a Java application parse a specially-crafted XML file could use this flaw to make the XML parser to enter an infinite loop. This issue was fixed by Xerces upstream via: http://svn.apache.org/viewvc?view=revision&revision=319059
Public now via: http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html Fixed in Oracle Java 7 Update 5 and 6 Update 33.
The fix for this issue is or will be included in the following IcedTea versions: * IcedTea6 1.10.8 * IcedTea6 1.11.3 * IcedTea7 2.1.1 * IcedTea7 2.2.1 IcedTea6 releases announcement: http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2012-June/019076.html http://blog.fuseyism.com/index.php/2012/06/12/security-icedtea6-1-10-8-1-11-3-released/ Patch: http://icedtea.classpath.org/hg/release/icedtea6-1.11/file/6e6d7783aabb/patches/security/20120612/7157609.patch http://icedtea.classpath.org/hg/release/icedtea7-forest-2.1/jaxp/rev/7a8825b15df6
This issue has been addressed in following products: Red Hat Enterprise Linux 5 Via RHSA-2012:0730 https://rhn.redhat.com/errata/RHSA-2012-0730.html
This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2012:0729 https://rhn.redhat.com/errata/RHSA-2012-0729.html
This issue has been addressed in following products: Supplementary for Red Hat Enterprise Linux 6 Supplementary for Red Hat Enterprise Linux 5 Via RHSA-2012:0734 https://rhn.redhat.com/errata/RHSA-2012-0734.html
IcedTea7 releases announcement: http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2012-June/019094.html http://blog.fuseyism.com/index.php/2012/06/13/security-icedtea-2-1-1-2-2-1-released/
This issue has been addressed in following products: Supplementary for Red Hat Enterprise Linux 6 Via RHSA-2012:1019 https://rhn.redhat.com/errata/RHSA-2012-1019.html
This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2012:1009 https://rhn.redhat.com/errata/RHSA-2012-1009.html