Bug 865541 - (CVE-2012-5085) CVE-2012-5085 OpenJDK: disable Gopher support by default (Gopher, 7189567)
CVE-2012-5085 OpenJDK: disable Gopher support by default (Gopher, 7189567)
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
impact=low,public=20121016,reported=2...
: Security
Depends On:
Blocks: 862579
  Show dependency treegraph
 
Reported: 2012-10-11 13:29 EDT by Tomas Hoger
Modified: 2015-08-22 11:50 EDT (History)
7 users (show)

See Also:
Fixed In Version: icedtea6 1.10.10, icedtea6 1.11.5, icedtea7 2.1.3, icedtea7 2.2.3, icedtea7 2.3.3
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2015-08-22 11:50:11 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:


Attachments (Terms of Use)

  None (edit)
Description Tomas Hoger 2012-10-11 13:29:44 EDT
Oracle Java SE updates 7u9 and 6u37 disable Gopher protocol support by default in the java.net package.  Update also introduces a new property "jdk.net.registerGopherProtocol" which can be set to true to re-enable Gopher support.
Comment 2 Vincent Danen 2012-10-16 21:57:52 EDT
MITRE describes the issue thus:

Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote authenticated users to have an unspecified impact via unknown vectors related to Networking.  NOTE: the Oracle CPU states that this issue has a 0.0 CVSS score. If so, then this is not a vulnerability and this issue should not be included in CVE.
Comment 3 Tomas Hoger 2012-10-17 10:40:20 EDT
Fixed now in Oracle JDK 7u9 and 6u37.

External Reference:

http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html
Comment 5 errata-xmlrpc 2012-10-17 12:10:25 EDT
This issue has been addressed in following products:

  Red Hat Enterprise Linux 6

Via RHSA-2012:1386 https://rhn.redhat.com/errata/RHSA-2012-1386.html
Comment 6 errata-xmlrpc 2012-10-17 12:11:23 EDT
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5

Via RHSA-2012:1385 https://rhn.redhat.com/errata/RHSA-2012-1385.html
Comment 7 errata-xmlrpc 2012-10-17 12:12:18 EDT
This issue has been addressed in following products:

  Red Hat Enterprise Linux 6

Via RHSA-2012:1384 https://rhn.redhat.com/errata/RHSA-2012-1384.html
Comment 9 errata-xmlrpc 2012-10-18 12:46:35 EDT
This issue has been addressed in following products:

  Supplementary for Red Hat Enterprise Linux 6

Via RHSA-2012:1391 https://rhn.redhat.com/errata/RHSA-2012-1391.html
Comment 10 errata-xmlrpc 2012-10-18 12:57:13 EDT
This issue has been addressed in following products:

  Supplementary for Red Hat Enterprise Linux 5
  Supplementary for Red Hat Enterprise Linux 6

Via RHSA-2012:1392 https://rhn.redhat.com/errata/RHSA-2012-1392.html

Note You need to log in before you can comment on or make changes to this bug.