Bug 789301 (CVE-2012-0497) - CVE-2012-0497 OpenJDK: insufficient checking of the graphics rendering object (2D, 7112642)
Summary: CVE-2012-0497 OpenJDK: insufficient checking of the graphics rendering object...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2012-0497
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
urgent
urgent
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 787142 787143 787144 787145 813689 813690 813691 813692
Blocks: 786724
TreeView+ depends on / blocked
 
Reported: 2012-02-10 10:41 UTC by Tomas Hoger
Modified: 2019-09-29 12:50 UTC (History)
10 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2012-04-25 07:02:45 UTC


Attachments (Terms of Use)


Links
System ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2012:0135 normal SHIPPED_LIVE Critical: java-1.6.0-openjdk security update 2012-02-15 04:42:17 UTC
Red Hat Product Errata RHSA-2012:0322 normal SHIPPED_LIVE Important: java-1.6.0-openjdk security update 2012-02-22 02:57:32 UTC
Red Hat Product Errata RHSA-2012:0514 normal SHIPPED_LIVE Critical: java-1.6.0-ibm security update 2013-11-13 16:13:53 UTC
Red Hat Product Errata RHSA-2013:1455 normal SHIPPED_LIVE Low: Red Hat Network Satellite server IBM Java Runtime security update 2013-10-23 20:30:21 UTC

Description Tomas Hoger 2012-02-10 10:41:26 UTC
It was discovered that Java2D did not properly check graphics rendering objects before passing them to the native renderer.  This could lead to Java Virtual Machine (JVM) crash or Java sandbox bypass.

Comment 2 Vincent Danen 2012-02-14 23:06:51 UTC
External Reference:

http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html

Comment 3 errata-xmlrpc 2012-02-14 23:43:31 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 6

Via RHSA-2012:0135 https://rhn.redhat.com/errata/RHSA-2012-0135.html

Comment 4 Tomas Hoger 2012-02-15 08:39:11 UTC
Patches were applied in following IcedTea versions:

* IcedTea6 1.8.13 (based on OpenJDK6 b18)
* IcedTea6 1.9.13 (based on OpenJDK6 b20)
* IcedTea6 1.10.6 (based on OpenJDK6 b22)
* IcedTea6 1.11.1 (based on OpenJDK6 b24)
* IcedTea 2.0.1 (based on OpenJDK7 u1 + u3 security patches)

http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2012-February/017249.html
http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2012-February/017233.html

Patch:
http://icedtea.classpath.org/hg/release/icedtea6-1.10/file/4e7a700d4ecc/patches/security/20120214/7112642.patch

Comment 5 errata-xmlrpc 2012-02-21 21:58:52 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5

Via RHSA-2012:0322 https://rhn.redhat.com/errata/RHSA-2012-0322.html

Comment 6 errata-xmlrpc 2012-04-24 19:36:06 UTC
This issue has been addressed in following products:

  Supplementary for Red Hat Enterprise Linux 5
  Supplementary for Red Hat Enterprise Linux 6

Via RHSA-2012:0514 https://rhn.redhat.com/errata/RHSA-2012-0514.html

Comment 7 errata-xmlrpc 2013-10-23 17:04:19 UTC
This issue has been addressed in following products:

  Red Hat Network Satellite Server v 5.4

Via RHSA-2013:1455 https://rhn.redhat.com/errata/RHSA-2013-1455.html


Note You need to log in before you can comment on or make changes to this bug.