It was discovered that Java logging API does not properly perform access control checks. An untrusted Java application or applet could use this flaw to bypass Java sandbox restrictions. External Reference: http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html
Upstream commit, as included in IcedTea7 repositories: http://icedtea.classpath.org/hg/release/icedtea7-forest-2.3/jdk/rev/ce105dd2e4de (Includes fixes for both CVE-2013-0425 (bug 907344) and CVE-2013-0426 (bug 907346)).
This issue has been addressed in following products: Supplementary for Red Hat Enterprise Linux 5 Supplementary for Red Hat Enterprise Linux 6 Via RHSA-2013:0237 https://rhn.redhat.com/errata/RHSA-2013-0237.html
This issue has been addressed in following products: Supplementary for Red Hat Enterprise Linux 5 Supplementary for Red Hat Enterprise Linux 6 Via RHSA-2013:0236 https://rhn.redhat.com/errata/RHSA-2013-0236.html
(In reply to comment #2) > Upstream commit, as included in IcedTea7 repositories: > > http://icedtea.classpath.org/hg/release/icedtea7-forest-2.3/jdk/rev/ce105dd2e4de This issue introduced a regression which broke custom logger implementations, see e.g. bug 908497. Regression is corrected via: http://icedtea.classpath.org/hg/release/icedtea7-forest-2.3/jdk/rev/272466e46b3f http://icedtea.classpath.org/hg/release/icedtea7-forest-2.3/jdk/rev/635d562a25be
This issue has been addressed in following products: Red Hat Enterprise Linux 5 Via RHSA-2013:0246 https://rhn.redhat.com/errata/RHSA-2013-0246.html
This issue has been addressed in following products: Red Hat Enterprise Linux 5 Red Hat Enterprise Linux 6 Via RHSA-2013:0247 https://rhn.redhat.com/errata/RHSA-2013-0247.html
This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2013:0245 https://rhn.redhat.com/errata/RHSA-2013-0245.html
Commits in the jdk7-dev repository, including original Oracle fix dates: http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/f26def552d2c http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/693b931cd7cf
Fixed in upstream IcedTea versions IcedTea6 1.11.6, and 1.12.1, and IcedTea7 2.1.5, 2.2.5, and 2.3.6: http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2013-February/021708.html http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2013-February/021728.html http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2013-February/021905.html http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2013-February/021876.html Note that version 2.3.5 was tagged in upstream mercurial including the security fixes, but was not released. Only 2.3.6 was released, correcting problem introduced by security patches as included in 2.3.5. The regression mentioned in comment #5 was included in IcedTea6 1.11.6 and 1.12.1 and corrected in versions 1.11.7 and 1.12.2: http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2013-February/021858.html
This issue has been addressed in following products: Supplementary for Red Hat Enterprise Linux 5 Supplementary for Red Hat Enterprise Linux 6 Via RHSA-2013:0624 https://rhn.redhat.com/errata/RHSA-2013-0624.html
This issue has been addressed in following products: Supplementary for Red Hat Enterprise Linux 5 Supplementary for Red Hat Enterprise Linux 6 Via RHSA-2013:0626 https://rhn.redhat.com/errata/RHSA-2013-0626.html
This issue has been addressed in following products: Supplementary for Red Hat Enterprise Linux 5 Supplementary for Red Hat Enterprise Linux 6 Via RHSA-2013:0625 https://rhn.redhat.com/errata/RHSA-2013-0625.html
This issue has been addressed in following products: Red Hat Network Satellite Server v 5.5 Via RHSA-2013:1456 https://rhn.redhat.com/errata/RHSA-2013-1456.html
This issue has been addressed in following products: Red Hat Network Satellite Server v 5.4 Via RHSA-2013:1455 https://rhn.redhat.com/errata/RHSA-2013-1455.html