Amazon Linux 1 Security Advisory: ALAS-2013-163
Advisory Release Date: 2013-03-02 16:50 Pacific
Advisory Updated Date: 2014-09-15 22:35 Pacific
Severity:
Important
References:
CVE-2013-0169
CVE-2013-1486
RHSA-2013-0273
FAQs regarding Amazon Linux ALAS/CVE Severity
FAQs regarding Amazon Linux ALAS/CVE Severity
Issue Overview:
An improper permission check issue was discovered in the JMX component in OpenJDK. An untrusted Java application or applet could use this flaw to bypass Java sandbox restrictions. (CVE-2013-1486)
It was discovered that OpenJDK leaked timing information when decrypting TLS/SSL protocol encrypted records when CBC-mode cipher suites were used. A remote attacker could possibly use this flaw to retrieve plain text from the encrypted packets by using a TLS/SSL server as a padding oracle. (CVE-2013-0169)
Affected Packages:
java-1.6.0-openjdk
Issue Correction:
Run yum update java-1.6.0-openjdk to update your system.
New Packages:
i686:
java-1.6.0-openjdk-devel-1.6.0.0-56.1.11.8.51.amzn1.i686
java-1.6.0-openjdk-javadoc-1.6.0.0-56.1.11.8.51.amzn1.i686
java-1.6.0-openjdk-src-1.6.0.0-56.1.11.8.51.amzn1.i686
java-1.6.0-openjdk-demo-1.6.0.0-56.1.11.8.51.amzn1.i686
java-1.6.0-openjdk-1.6.0.0-56.1.11.8.51.amzn1.i686
java-1.6.0-openjdk-debuginfo-1.6.0.0-56.1.11.8.51.amzn1.i686
src:
java-1.6.0-openjdk-1.6.0.0-56.1.11.8.51.amzn1.src
x86_64:
java-1.6.0-openjdk-javadoc-1.6.0.0-56.1.11.8.51.amzn1.x86_64
java-1.6.0-openjdk-demo-1.6.0.0-56.1.11.8.51.amzn1.x86_64
java-1.6.0-openjdk-debuginfo-1.6.0.0-56.1.11.8.51.amzn1.x86_64
java-1.6.0-openjdk-src-1.6.0.0-56.1.11.8.51.amzn1.x86_64
java-1.6.0-openjdk-devel-1.6.0.0-56.1.11.8.51.amzn1.x86_64
java-1.6.0-openjdk-1.6.0.0-56.1.11.8.51.amzn1.x86_64