It was discovered that the JGSS component of OpenJDK could possibly leak information via exceptions. An untrusted Java application or applet could possibly use this flaw to bypass certain Java sandbox restrictions and determine the path of the default keytab file. http://docs.oracle.com/javase/7/docs/api/javax/security/auth/kerberos/KeyTab.html
External References: http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html
Fixed in Oracle Java SE 7u45. OpenJDK upstream commit: http://hg.openjdk.java.net/jdk7u/jdk7u/jdk/rev/ffe487772a54
This issue has been addressed in following products: Supplementary for Red Hat Enterprise Linux 6 Supplementary for Red Hat Enterprise Linux 5 Via RHSA-2013:1440 https://rhn.redhat.com/errata/RHSA-2013-1440.html
This issue has been addressed in following products: Red Hat Enterprise Linux 5 Via RHSA-2013:1447 https://rhn.redhat.com/errata/RHSA-2013-1447.html
This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2013:1451 https://rhn.redhat.com/errata/RHSA-2013-1451.html
This issue has been addressed in following products: Supplementary for Red Hat Enterprise Linux 5 Supplementary for Red Hat Enterprise Linux 6 Via RHSA-2013:1507 https://rhn.redhat.com/errata/RHSA-2013-1507.html
Fixed in IcedTea7 2.4.3: http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2013-October/025087.html